Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-7566 (GCVE-0-2018-7566)
Vulnerability from cvelistv5
Published
2018-03-30 21:00
Modified
2024-08-05 06:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:04.728Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3631-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3631-2/" }, { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3631-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3631-1/" }, { "name": "RHSA-2018:2390", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2395", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "DSA-4188", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:2948", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "103605", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103605" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html" }, { "name": "USN-3798-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3798-1/" }, { "name": "USN-3798-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3798-2/" }, { "name": "SUSE-SU-2018:0834", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" }, { "name": "RHSA-2019:1483", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "name": "RHSA-2019:1487", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-15T02:22:59", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-3631-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3631-2/" }, { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3631-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3631-1/" }, { "name": "RHSA-2018:2390", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2395", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "DSA-4188", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:2948", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "103605", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103605" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html" }, { "name": "USN-3798-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3798-1/" }, { "name": "USN-3798-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3798-2/" }, { "name": "SUSE-SU-2018:0834", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" }, { "name": "RHSA-2019:1483", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "name": "RHSA-2019:1487", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7566", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3631-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3631-2/" }, { "name": "DSA-4187", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3631-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3631-1/" }, { "name": "RHSA-2018:2390", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2395", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "DSA-4188", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:2948", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "103605", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103605" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations", "refsource": "MLIST", "url": "http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html" }, { "name": "USN-3798-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3798-1/" }, { "name": "USN-3798-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3798-2/" }, { "name": "SUSE-SU-2018:0834", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" }, { "name": "RHSA-2019:1483", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "name": "RHSA-2019:1487", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da", "refsource": "CONFIRM", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-7566", "datePublished": "2018-03-30T21:00:00", "dateReserved": "2018-02-28T00:00:00", "dateUpdated": "2024-08-05T06:31:04.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-7566\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-03-30T21:29:02.010\",\"lastModified\":\"2024-11-21T04:12:22.790\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.\"},{\"lang\":\"es\",\"value\":\"El kernel de Linux 4.15 tiene un desbordamiento de b\u00fafer mediante una operaci\u00f3n de escritura ioctl SNDRV_SEQ_IOCTL_SET_CLIENT_POOL en /dev/snd/seq por un usuario local.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"},{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"380E55F5-238D-4FBB-8DB1-DB10EFC37CD0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8F4626-6942-4A79-BF25-C8AD33A82034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"B2F3699A-38E4-4E9D-9414-411F71D9E371\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_eagle_application_processor:16.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C0B6815-6F8F-422D-8A9C-2C22691787FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_eagle_application_processor:16.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B63EF130-191C-47A1-9D54-0AB3159EB303\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/103605\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2384\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2390\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2395\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2948\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1483\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1487\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1550142\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3631-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3631-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3798-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3798-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4187\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4188\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/103605\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2390\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2395\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2948\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1483\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1550142\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3631-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3631-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3798-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3798-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4187\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
suse-su-2018:1014-1
Vulnerability from csaf_suse
Published
2018-04-20 08:26
Modified
2018-04-20 08:26
Summary
Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_60 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SAP-12-SP1-2018-691,SUSE-SLE-SERVER-12-SP1-2018-691
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_60 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-691,SUSE-SLE-SERVER-12-SP1-2018-691", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1014-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1014-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181014-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1014-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003930.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-04-20T08:26:27Z", "generator": { "date": "2018-04-20T08:26:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1014-1", "initial_release_date": "2018-04-20T08:26:27Z", "revision_history": [ { "date": "2018-04-20T08:26:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:27Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:27Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:27Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:27Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1018-1
Vulnerability from csaf_suse
Published
2018-04-20 08:26
Modified
2018-04-20 08:26
Summary
Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_66 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SAP-12-SP1-2018-693,SUSE-SLE-SERVER-12-SP1-2018-693
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_66 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-693,SUSE-SLE-SERVER-12-SP1-2018-693", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1018-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1018-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181018-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1018-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003933.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-04-20T08:26:45Z", "generator": { "date": "2018-04-20T08:26:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1018-1", "initial_release_date": "2018-04-20T08:26:45Z", "revision_history": [ { "date": "2018-04-20T08:26:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:45Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:45Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:45Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:45Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1000-1
Vulnerability from csaf_suse
Published
2018-04-20 08:34
Modified
2018-04-20 08:34
Summary
Security update for the Linux Kernel (Live Patch 26 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 26 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_89 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SERVER-12-2018-706
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 26 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_89 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-706", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1000-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1000-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181000-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1000-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003916.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 26 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:34:32Z", "generator": { "date": "2018-04-20T08:34:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1000-1", "initial_release_date": "2018-04-20T08:34:32Z", "revision_history": [ { "date": "2018-04-20T08:34:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:32Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:32Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:32Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:32Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1008-1
Vulnerability from csaf_suse
Published
2018-04-20 08:26
Modified
2018-04-20 08:26
Summary
Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_45 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SAP-12-SP1-2018-689,SUSE-SLE-SERVER-12-SP1-2018-689
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_45 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-689,SUSE-SLE-SERVER-12-SP1-2018-689", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1008-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1008-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181008-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1008-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-04-20T08:26:09Z", "generator": { "date": "2018-04-20T08:26:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1008-1", "initial_release_date": "2018-04-20T08:26:09Z", "revision_history": [ { "date": "2018-04-20T08:26:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:09Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:09Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:09Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:09Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1013-1
Vulnerability from csaf_suse
Published
2018-04-20 08:24
Modified
2018-04-20 08:24
Summary
Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.90-6_12 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-681
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.90-6_12 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-681", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1013-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1013-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181013-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1013-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-04-20T08:24:53Z", "generator": { "date": "2018-04-20T08:24:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1013-1", "initial_release_date": "2018-04-20T08:24:53Z", "revision_history": [ { "date": "2018-04-20T08:24:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64", "product_id": "kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:53Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:53Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:53Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:53Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1034-1
Vulnerability from csaf_suse
Published
2018-04-20 08:26
Modified
2018-04-20 08:26
Summary
Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_63 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SAP-12-SP1-2018-692,SUSE-SLE-SERVER-12-SP1-2018-692
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_63 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-692,SUSE-SLE-SERVER-12-SP1-2018-692", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1034-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1034-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181034-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1034-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003949.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-04-20T08:26:37Z", "generator": { "date": "2018-04-20T08:26:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1034-1", "initial_release_date": "2018-04-20T08:26:37Z", "revision_history": [ { "date": "2018-04-20T08:26:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:37Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:37Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:37Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:37Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1012-1
Vulnerability from csaf_suse
Published
2018-04-20 08:20
Modified
2018-04-20 08:20
Summary
Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.59-92_17 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-666,SUSE-SLE-SERVER-12-SP2-2018-666
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.59-92_17 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-666,SUSE-SLE-SERVER-12-SP2-2018-666", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1012-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1012-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181012-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1012-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T08:20:08Z", "generator": { "date": "2018-04-20T08:20:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1012-1", "initial_release_date": "2018-04-20T08:20:08Z", "revision_history": [ { "date": "2018-04-20T08:20:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "product_id": "kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:08Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:08Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:08Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_17-default-10-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:08Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1007-1
Vulnerability from csaf_suse
Published
2018-04-20 09:46
Modified
2018-04-20 09:46
Summary
Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.74-92_38 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-712,SUSE-SLE-SERVER-12-SP2-2018-712
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_38 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-712,SUSE-SLE-SERVER-12-SP2-2018-712", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1007-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1007-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181007-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1007-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003923.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T09:46:04Z", "generator": { "date": "2018-04-20T09:46:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1007-1", "initial_release_date": "2018-04-20T09:46:04Z", "revision_history": [ { "date": "2018-04-20T09:46:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "product_id": "kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T09:46:04Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T09:46:04Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T09:46:04Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T09:46:04Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0997-1
Vulnerability from csaf_suse
Published
2018-04-20 08:25
Modified
2018-04-20 08:25
Summary
Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.82-6_6 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-682
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.82-6_6 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-682", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0997-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0997-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180997-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0997-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003913.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-04-20T08:25:00Z", "generator": { "date": "2018-04-20T08:25:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0997-1", "initial_release_date": "2018-04-20T08:25:00Z", "revision_history": [ { "date": "2018-04-20T08:25:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:00Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:00Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0996-1
Vulnerability from csaf_suse
Published
2018-04-20 08:34
Modified
2018-04-20 08:34
Summary
Security update for the Linux Kernel (Live Patch 24 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 24 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_83 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SERVER-12-2018-704
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 24 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_83 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-704", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0996-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0996-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180996-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0996-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003912.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 24 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:34:19Z", "generator": { "date": "2018-04-20T08:34:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0996-1", "initial_release_date": "2018-04-20T08:34:19Z", "revision_history": [ { "date": "2018-04-20T08:34:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:19Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:19Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:19Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:19Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1029-1
Vulnerability from csaf_suse
Published
2018-04-20 08:27
Modified
2018-04-20 08:27
Summary
Security update for the Linux Kernel (Live Patch 29 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 29 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_106 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SERVER-12-2018-697
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 29 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_106 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-697", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1029-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1029-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181029-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1029-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003944.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 29 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:27:19Z", "generator": { "date": "2018-04-20T08:27:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1029-1", "initial_release_date": "2018-04-20T08:27:19Z", "revision_history": [ { "date": "2018-04-20T08:27:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:27:19Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:27:19Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:27:19Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:27:19Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1002-1
Vulnerability from csaf_suse
Published
2018-04-20 08:23
Modified
2018-04-20 08:23
Summary
Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.114-94_11 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-676
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-94_11 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-676", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1002-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1002-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181002-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1002-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003918.html" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-04-20T08:23:21Z", "generator": { "date": "2018-04-20T08:23:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1002-1", "initial_release_date": "2018-04-20T08:23:21Z", "revision_history": [ { "date": "2018-04-20T08:23:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:23:21Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:23:21Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:23:21Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1021-1
Vulnerability from csaf_suse
Published
2018-04-20 08:19
Modified
2018-04-20 08:19
Summary
Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.59-92_24 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-665,SUSE-SLE-SERVER-12-SP2-2018-665
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.59-92_24 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-665,SUSE-SLE-SERVER-12-SP2-2018-665", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1021-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1021-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181021-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1021-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003936.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T08:19:49Z", "generator": { "date": "2018-04-20T08:19:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1021-1", "initial_release_date": "2018-04-20T08:19:49Z", "revision_history": [ { "date": "2018-04-20T08:19:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "product_id": "kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:19:49Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:19:49Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:19:49Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:19:49Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1028-1
Vulnerability from csaf_suse
Published
2018-04-20 08:24
Modified
2018-04-20 08:24
Summary
Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.92-6_30 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-680
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.92-6_30 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-680", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1028-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1028-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181028-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1028-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003943.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-04-20T08:24:46Z", "generator": { "date": "2018-04-20T08:24:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1028-1", "initial_release_date": "2018-04-20T08:24:46Z", "revision_history": [ { "date": "2018-04-20T08:24:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:46Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:46Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:46Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:46Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1309-1
Vulnerability from csaf_suse
Published
2018-05-16 14:59
Modified
2018-05-16 14:59
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-10124: The kill_something_info function in kernel/signal.c might
have allowed local users to cause a denial of service via an INT_MIN argument
(bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed
local users to cause a denial of service by triggering an attempted use of the
-INT_MIN value (bnc#1089608).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in
drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of
service (memory consumption) via many read accesses to files in the
/sys/class/sas_phy directory, as demonstrated by the
/sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).
- CVE-2018-7566: Buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl
write operation to /dev/snd/seq by a local user potentially allowing for code
execution (bnc#1083483).
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in
the ALSA subsystem allowed attackers to gain privileges via unspecified vectors
(bnc#1088260 1088268).
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel
function could have beenexploited by malicious NCPFS servers to crash the
kernel or execute code (bnc#1086162).
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the video
driver (bnc#1072865).
- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allow
local users to cause a denial of service (BUG) by leveraging a race condition
with __dm_destroy during creation and removal of DM devices (bnc#1083242).
- CVE-2017-16911: The vhci_hcd driver allowed local attackers to disclose
kernel memory addresses. Successful exploitation requires that a USB device is
attached over IP (bnc#1078674).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local
users to cause a denial of service (infinite loop) by triggering use of
MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2017-16644: The hdpvr_probe function in
drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of
service (improper error handling and system crash) or possibly have unspecified
other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function in kernel/futex.c allowed attackers
to cause a denial of service (integer overflow) or possibly have unspecified
other impact by triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function
(drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service
(NULL pointer dereference) via a specially crafted USB over IP packet
(bnc#1078669).
- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed
physically proximate attackers to obtain sensitive information from kernel
memory or cause a denial of service (out-of-bounds read) by connecting a
device, as demonstrated by a Logitech DJ receiver (bnc#1010470).
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c
attempted to support a FRAGLIST feature without proper memory allocation, which
allowed guest OS users to cause a denial of service (buffer overflow and memory
corruption) via a crafted sequence of fragmented packets (bnc#940776).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in
block/bio.c did unbalanced refcounting when a SCSI I/O vector had small
consecutive buffers belonging to the same page. The bio_add_pc_page function
merged them into one, but the page reference was never dropped. This caused a
memory leak and possible system lockup (exploitable against the host OS by a
guest OS user, if a SCSI disk is passed through to a virtual machine) due to an
out-of-memory condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c)
allowed attackers to cause a denial of service (out-of-bounds read) via a
specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function
(drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed
attackers to cause a denial of service (arbitrary memory allocation) via a
specially crafted USB over IP packet (bnc#1078672).
The following non-security bugs were fixed:
- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.
- KABI: x86/kaiser: properly align trampoline stack.
- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- KEYS: prevent creating a different user's keyrings (bnc#1065999).
- NFSv4: fix getacl head length estimation (git-fixes).
- PCI: Use function 0 VPD for identical functions, regular VPD for others (bnc#943786 git-fixes).
- Revert 'USB: cdc-acm: fix broken runtime suspend' (bsc#1067912)
- Subject: af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085513, LTC#165135).
- blacklist.conf: blacklisted 7edaeb6841df ('kernel/watchdog: Prevent false positives with turbo modes') (bnc#1063516)
- blacklist.conf: blacklisted 9fbc1f635fd0bd28cb32550211bf095753ac637a (bnc#1089665)
- blacklist.conf: blacklisted ba4877b9ca51f80b5d30f304a46762f0509e1635 (bnc#1089668)
- cifs: fix buffer overflow in cifs_build_path_to_root() (bsc#1085113).
- drm/mgag200: fix a test in mga_vga_mode_valid() (bsc#1087092).
- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1013018).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1013018).
- ide-cd: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (git-fixes).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- media: cpia2: Fix a couple off by one bugs (bsc#1050431).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- pipe: actually allow root to exceed the pipe buffer limits (git-fixes).
- posix-timers: Protect posix clock array access against speculation (bnc#1081358).
- powerpc/fadump: Add a warning when 'fadump_reserve_mem=' is used (bnc#1032084).
- powerpc/fadump: reuse crashkernel parameter for fadump memory reservation (bnc#1032084).
- powerpc/fadump: update documentation about crashkernel parameter reuse (bnc#1032084).
- powerpc/fadump: use 'fadump_reserve_mem=' when specified (bnc#1032084).
- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075088).
- qeth: repair SBAL elements calculation (bnc#1085513, LTC#165484).
- s390/qeth: fix underestimated count of buffer elements (bnc#1082091, LTC#164529).
- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- usbnet: Fix a race between usbnet_stop() and the BH (bsc#1083275).
- x86-64: Move the 'user' vsyscall segment out of the data segment (bsc#1082424).
- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).
- x86/kaiser: properly align trampoline stack (bsc#1087260).
- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).
- xen/x86/CPU: Check speculation control CPUID bit (bsc#1068032).
- xen/x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- xen/x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600).
- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).
- xen/x86/kaiser: Move feature detection up (bsc#1068032).
- xfs: check for buffer errors before waiting (bsc#1052943).
- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
Patchnames
slertesp4-kernel-13604
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might\n have allowed local users to cause a denial of service via an INT_MIN argument\n (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed\n local users to cause a denial of service by triggering an attempted use of the\n -INT_MIN value (bnc#1089608).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in\n drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of\n service (memory consumption) via many read accesses to files in the\n /sys/class/sas_phy directory, as demonstrated by the\n /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).\n- CVE-2018-7566: Buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl\n write operation to /dev/snd/seq by a local user potentially allowing for code\n execution (bnc#1083483).\n- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in\n the ALSA subsystem allowed attackers to gain privileges via unspecified vectors\n (bnc#1088260 1088268).\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel\n function could have beenexploited by malicious NCPFS servers to crash the\n kernel or execute code (bnc#1086162).\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the video\n driver (bnc#1072865).\n- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allow\n local users to cause a denial of service (BUG) by leveraging a race condition\n with __dm_destroy during creation and removal of DM devices (bnc#1083242).\n- CVE-2017-16911: The vhci_hcd driver allowed local attackers to disclose\n kernel memory addresses. Successful exploitation requires that a USB device is\n attached over IP (bnc#1078674).\n- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local\n users to cause a denial of service (infinite loop) by triggering use of\n MADVISE_WILLNEED for a DAX mapping (bnc#1083494).\n- CVE-2017-16644: The hdpvr_probe function in\n drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of\n service (improper error handling and system crash) or possibly have unspecified\n other impact via a crafted USB device (bnc#1067118).\n- CVE-2018-6927: The futex_requeue function in kernel/futex.c allowed attackers\n to cause a denial of service (integer overflow) or possibly have unspecified\n other impact by triggering a negative wake or requeue value (bnc#1080757).\n- CVE-2017-16914: The \u0027stub_send_ret_submit()\u0027 function\n (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service\n (NULL pointer dereference) via a specially crafted USB over IP packet\n (bnc#1078669).\n- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed\n physically proximate attackers to obtain sensitive information from kernel\n memory or cause a denial of service (out-of-bounds read) by connecting a\n device, as demonstrated by a Logitech DJ receiver (bnc#1010470).\n- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c\n attempted to support a FRAGLIST feature without proper memory allocation, which\n allowed guest OS users to cause a denial of service (buffer overflow and memory\n corruption) via a crafted sequence of fragmented packets (bnc#940776).\n- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in\n block/bio.c did unbalanced refcounting when a SCSI I/O vector had small\n consecutive buffers belonging to the same page. The bio_add_pc_page function\n merged them into one, but the page reference was never dropped. This caused a\n memory leak and possible system lockup (exploitable against the host OS by a\n guest OS user, if a SCSI disk is passed through to a virtual machine) due to an\n out-of-memory condition (bnc#1062568).\n- CVE-2017-16912: The \u0027get_pipe()\u0027 function (drivers/usb/usbip/stub_rx.c)\n allowed attackers to cause a denial of service (out-of-bounds read) via a\n specially crafted USB over IP packet (bnc#1078673).\n- CVE-2017-16913: The \u0027stub_recv_cmd_submit()\u0027 function\n (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed\n attackers to cause a denial of service (arbitrary memory allocation) via a\n specially crafted USB over IP packet (bnc#1078672).\n\nThe following non-security bugs were fixed:\n\n- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.\n- KABI: x86/kaiser: properly align trampoline stack.\n- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).\n- KEYS: prevent creating a different user\u0027s keyrings (bnc#1065999).\n- NFSv4: fix getacl head length estimation (git-fixes).\n- PCI: Use function 0 VPD for identical functions, regular VPD for others (bnc#943786 git-fixes).\n- Revert \u0027USB: cdc-acm: fix broken runtime suspend\u0027 (bsc#1067912)\n- Subject: af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085513, LTC#165135).\n- blacklist.conf: blacklisted 7edaeb6841df (\u0027kernel/watchdog: Prevent false positives with turbo modes\u0027) (bnc#1063516)\n- blacklist.conf: blacklisted 9fbc1f635fd0bd28cb32550211bf095753ac637a (bnc#1089665)\n- blacklist.conf: blacklisted ba4877b9ca51f80b5d30f304a46762f0509e1635 (bnc#1089668)\n- cifs: fix buffer overflow in cifs_build_path_to_root() (bsc#1085113).\n- drm/mgag200: fix a test in mga_vga_mode_valid() (bsc#1087092).\n- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1013018).\n- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1013018).\n- ide-cd: workaround VMware ESXi cdrom emulation bug (bsc#1080813).\n- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).\n- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).\n- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).\n- jffs2: Fix use-after-free bug in jffs2_iget()\u0027s error handling path (git-fixes).\n- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).\n- media: cpia2: Fix a couple off by one bugs (bsc#1050431).\n- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).\n- pipe: actually allow root to exceed the pipe buffer limits (git-fixes).\n- posix-timers: Protect posix clock array access against speculation (bnc#1081358).\n- powerpc/fadump: Add a warning when \u0027fadump_reserve_mem=\u0027 is used (bnc#1032084).\n- powerpc/fadump: reuse crashkernel parameter for fadump memory reservation (bnc#1032084).\n- powerpc/fadump: update documentation about crashkernel parameter reuse (bnc#1032084).\n- powerpc/fadump: use \u0027fadump_reserve_mem=\u0027 when specified (bnc#1032084).\n- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075088).\n- qeth: repair SBAL elements calculation (bnc#1085513, LTC#165484).\n- s390/qeth: fix underestimated count of buffer elements (bnc#1082091, LTC#164529).\n- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).\n- usbnet: Fix a race between usbnet_stop() and the BH (bsc#1083275).\n- x86-64: Move the \u0027user\u0027 vsyscall segment out of the data segment (bsc#1082424).\n- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).\n- x86/kaiser: properly align trampoline stack (bsc#1087260).\n- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).\n- xen/x86/CPU: Check speculation control CPUID bit (bsc#1068032).\n- xen/x86/CPU: Sync CPU feature flags late (bsc#1075994 bsc#1075091).\n- xen/x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).\n- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).\n- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the \u0027clearcpuid=\u0027 command-line option (bsc#1065600).\n- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).\n- xen/x86/kaiser: Move feature detection up (bsc#1068032).\n- xfs: check for buffer errors before waiting (bsc#1052943).\n- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-13604", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1309-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1309-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181309-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1309-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" }, { "category": "self", "summary": "SUSE Bug 1010470", "url": "https://bugzilla.suse.com/1010470" }, { "category": "self", "summary": "SUSE Bug 1013018", "url": "https://bugzilla.suse.com/1013018" }, { "category": "self", "summary": "SUSE Bug 1032084", "url": "https://bugzilla.suse.com/1032084" }, { "category": "self", "summary": "SUSE Bug 1039348", "url": "https://bugzilla.suse.com/1039348" }, { "category": "self", "summary": "SUSE Bug 1050431", "url": "https://bugzilla.suse.com/1050431" }, { "category": "self", "summary": "SUSE Bug 1052943", "url": "https://bugzilla.suse.com/1052943" }, { "category": "self", "summary": "SUSE Bug 1062568", "url": "https://bugzilla.suse.com/1062568" }, { "category": "self", "summary": "SUSE Bug 1062840", "url": "https://bugzilla.suse.com/1062840" }, { "category": "self", "summary": "SUSE Bug 1063416", "url": "https://bugzilla.suse.com/1063416" }, { "category": "self", "summary": "SUSE Bug 1063516", "url": "https://bugzilla.suse.com/1063516" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065999", "url": "https://bugzilla.suse.com/1065999" }, { "category": "self", "summary": "SUSE Bug 1067118", "url": "https://bugzilla.suse.com/1067118" }, { "category": "self", "summary": "SUSE Bug 1067912", "url": "https://bugzilla.suse.com/1067912" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1072689", "url": "https://bugzilla.suse.com/1072689" }, { "category": "self", "summary": "SUSE Bug 1072865", "url": "https://bugzilla.suse.com/1072865" }, { "category": "self", "summary": "SUSE Bug 1075088", "url": "https://bugzilla.suse.com/1075088" }, { "category": "self", "summary": "SUSE Bug 1075091", "url": "https://bugzilla.suse.com/1075091" }, { "category": "self", "summary": "SUSE Bug 1075994", "url": "https://bugzilla.suse.com/1075994" }, { "category": "self", "summary": "SUSE Bug 1078669", "url": "https://bugzilla.suse.com/1078669" }, { "category": "self", "summary": "SUSE Bug 1078672", "url": "https://bugzilla.suse.com/1078672" }, { "category": "self", "summary": "SUSE Bug 1078673", "url": "https://bugzilla.suse.com/1078673" }, { "category": "self", "summary": "SUSE Bug 1078674", "url": "https://bugzilla.suse.com/1078674" }, { "category": "self", "summary": "SUSE Bug 1080464", "url": "https://bugzilla.suse.com/1080464" }, { "category": "self", "summary": "SUSE Bug 1080757", "url": "https://bugzilla.suse.com/1080757" }, { "category": "self", "summary": "SUSE Bug 1080813", "url": "https://bugzilla.suse.com/1080813" }, { "category": "self", "summary": "SUSE Bug 1081358", "url": "https://bugzilla.suse.com/1081358" }, { "category": "self", "summary": "SUSE Bug 1082091", "url": "https://bugzilla.suse.com/1082091" }, { "category": "self", "summary": "SUSE Bug 1082424", "url": "https://bugzilla.suse.com/1082424" }, { "category": "self", "summary": "SUSE Bug 1083242", "url": "https://bugzilla.suse.com/1083242" }, { "category": "self", "summary": "SUSE Bug 1083275", "url": "https://bugzilla.suse.com/1083275" }, { "category": "self", "summary": "SUSE Bug 1083483", "url": "https://bugzilla.suse.com/1083483" }, { "category": "self", "summary": "SUSE Bug 1083494", "url": "https://bugzilla.suse.com/1083494" }, { "category": "self", "summary": "SUSE Bug 1084536", "url": "https://bugzilla.suse.com/1084536" }, { "category": "self", "summary": "SUSE Bug 1085113", "url": "https://bugzilla.suse.com/1085113" }, { "category": "self", "summary": "SUSE Bug 1085279", "url": "https://bugzilla.suse.com/1085279" }, { "category": "self", "summary": "SUSE Bug 1085331", "url": "https://bugzilla.suse.com/1085331" }, { "category": "self", "summary": "SUSE Bug 1085513", "url": "https://bugzilla.suse.com/1085513" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1087209", "url": "https://bugzilla.suse.com/1087209" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1087762", "url": "https://bugzilla.suse.com/1087762" }, { "category": "self", "summary": "SUSE Bug 1088147", "url": "https://bugzilla.suse.com/1088147" }, { "category": "self", "summary": "SUSE Bug 1088260", "url": "https://bugzilla.suse.com/1088260" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089665", "url": "https://bugzilla.suse.com/1089665" }, { "category": "self", "summary": "SUSE Bug 1089668", "url": "https://bugzilla.suse.com/1089668" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 909077", "url": "https://bugzilla.suse.com/909077" }, { "category": "self", "summary": "SUSE Bug 940776", "url": "https://bugzilla.suse.com/940776" }, { "category": "self", "summary": "SUSE Bug 943786", "url": "https://bugzilla.suse.com/943786" }, { "category": "self", "summary": "SUSE Bug 951638", "url": "https://bugzilla.suse.com/951638" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5156 page", "url": "https://www.suse.com/security/cve/CVE-2015-5156/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7915 page", "url": "https://www.suse.com/security/cve/CVE-2016-7915/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0861 page", "url": "https://www.suse.com/security/cve/CVE-2017-0861/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12190 page", "url": "https://www.suse.com/security/cve/CVE-2017-12190/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16644 page", "url": "https://www.suse.com/security/cve/CVE-2017-16644/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16911 page", "url": "https://www.suse.com/security/cve/CVE-2017-16911/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16912 page", "url": "https://www.suse.com/security/cve/CVE-2017-16912/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16913 page", "url": "https://www.suse.com/security/cve/CVE-2017-16913/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16914 page", "url": "https://www.suse.com/security/cve/CVE-2017-16914/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18203 page", "url": "https://www.suse.com/security/cve/CVE-2017-18203/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18208 page", "url": "https://www.suse.com/security/cve/CVE-2017-18208/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6927 page", "url": "https://www.suse.com/security/cve/CVE-2018-6927/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7757 page", "url": "https://www.suse.com/security/cve/CVE-2018-7757/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-16T14:59:01Z", "generator": { "date": "2018-05-16T14:59:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1309-1", "initial_release_date": "2018-05-16T14:59:01Z", "revision_history": [ { "date": "2018-05-16T14:59:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-69.24.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-69.24.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-69.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-69.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-69.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-69.24.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-69.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-69.24.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-69.24.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5156" } ], "notes": [ { "category": "general", "text": "The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5156", "url": "https://www.suse.com/security/cve/CVE-2015-5156" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1123903" }, { "category": "external", "summary": "SUSE Bug 940776 for CVE-2015-5156", "url": "https://bugzilla.suse.com/940776" }, { "category": "external", "summary": "SUSE Bug 945048 for CVE-2015-5156", "url": "https://bugzilla.suse.com/945048" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-5156", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2015-5156" }, { "cve": "CVE-2016-7915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7915" } ], "notes": [ { "category": "general", "text": "The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7915", "url": "https://www.suse.com/security/cve/CVE-2016-7915" }, { "category": "external", "summary": "SUSE Bug 1010470 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1010470" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2016-7915" }, { "cve": "CVE-2017-0861", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0861" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0861", "url": "https://www.suse.com/security/cve/CVE-2017-0861" }, { "category": "external", "summary": "SUSE Bug 1088260 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088260" }, { "category": "external", "summary": "SUSE Bug 1088268 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088268" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2017-0861" }, { "cve": "CVE-2017-12190", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12190" } ], "notes": [ { "category": "general", "text": "The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12190", "url": "https://www.suse.com/security/cve/CVE-2017-12190" }, { "category": "external", "summary": "SUSE Bug 1062568 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1062568" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2017-12190" }, { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2017-16644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16644" } ], "notes": [ { "category": "general", "text": "The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16644", "url": "https://www.suse.com/security/cve/CVE-2017-16644" }, { "category": "external", "summary": "SUSE Bug 1067118 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1067118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2017-16644" }, { "cve": "CVE-2017-16911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16911" } ], "notes": [ { "category": "general", "text": "The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16911", "url": "https://www.suse.com/security/cve/CVE-2017-16911" }, { "category": "external", "summary": "SUSE Bug 1078674 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1078674" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "low" } ], "title": "CVE-2017-16911" }, { "cve": "CVE-2017-16912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16912" } ], "notes": [ { "category": "general", "text": "The \"get_pipe()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16912", "url": "https://www.suse.com/security/cve/CVE-2017-16912" }, { "category": "external", "summary": "SUSE Bug 1078673 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1078673" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2017-16912" }, { "cve": "CVE-2017-16913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16913" } ], "notes": [ { "category": "general", "text": "The \"stub_recv_cmd_submit()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16913", "url": "https://www.suse.com/security/cve/CVE-2017-16913" }, { "category": "external", "summary": "SUSE Bug 1078672 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1078672" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2017-16913" }, { "cve": "CVE-2017-16914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16914" } ], "notes": [ { "category": "general", "text": "The \"stub_send_ret_submit()\" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16914", "url": "https://www.suse.com/security/cve/CVE-2017-16914" }, { "category": "external", "summary": "SUSE Bug 1078669 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1078669" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "low" } ], "title": "CVE-2017-16914" }, { "cve": "CVE-2017-18203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18203" } ], "notes": [ { "category": "general", "text": "The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18203", "url": "https://www.suse.com/security/cve/CVE-2017-18203" }, { "category": "external", "summary": "SUSE Bug 1083242 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1083242" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2017-18203" }, { "cve": "CVE-2017-18208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18208" } ], "notes": [ { "category": "general", "text": "The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18208", "url": "https://www.suse.com/security/cve/CVE-2017-18208" }, { "category": "external", "summary": "SUSE Bug 1083494 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1083494" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2017-18208" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-6927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6927" } ], "notes": [ { "category": "general", "text": "The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6927", "url": "https://www.suse.com/security/cve/CVE-2018-6927" }, { "category": "external", "summary": "SUSE Bug 1080757 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1080757" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2018-6927" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "important" } ], "title": "CVE-2018-7566" }, { "cve": "CVE-2018-7757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7757" } ], "notes": [ { "category": "general", "text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7757", "url": "https://www.suse.com/security/cve/CVE-2018-7757" }, { "category": "external", "summary": "SUSE Bug 1084536 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1084536" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087209 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087209" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2018-7757" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.24.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-16T14:59:01Z", "details": "moderate" } ], "title": "CVE-2018-8822" } ] }
suse-su-2018:1026-1
Vulnerability from csaf_suse
Published
2018-04-20 08:27
Modified
2018-04-20 08:27
Summary
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_82 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: The Linux kernel had a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-695,SUSE-SLE-SERVER-12-SP1-2018-695
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_82 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: The Linux kernel had a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-695,SUSE-SLE-SERVER-12-SP1-2018-695", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1026-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1026-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181026-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1026-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003941.html" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-04-20T08:27:03Z", "generator": { "date": "2018-04-20T08:27:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1026-1", "initial_release_date": "2018-04-20T08:27:03Z", "revision_history": [ { "date": "2018-04-20T08:27:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:27:03Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:27:03Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:27:03Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1035-1
Vulnerability from csaf_suse
Published
2018-04-20 08:34
Modified
2018-04-20 08:34
Summary
Security update for the Linux Kernel (Live Patch 33 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 33 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_125 fixes one issue.
The following security issue was fixed:
- CVE-2018-7566: The Linux kernel had a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
Patchnames
SUSE-SLE-SERVER-12-2018-708
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 33 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_125 fixes one issue.\n\nThe following security issue was fixed:\n\n- CVE-2018-7566: The Linux kernel had a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-708", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1035-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1035-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181035-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1035-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003950.html" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 33 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:34:45Z", "generator": { "date": "2018-04-20T08:34:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1035-1", "initial_release_date": "2018-04-20T08:34:45Z", "revision_history": [ { "date": "2018-04-20T08:34:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_125-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_125-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_125-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_125-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_125-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_125-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:45Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0834-1
Vulnerability from csaf_suse
Published
2018-03-28 14:17
Modified
2018-03-28 14:17
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-1068: Fixed flaw in the implementation of 32-bit syscall interface
for bridging. This allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bnc#1085107).
- CVE-2017-18221: The __munlock_pagevec function allowed local users to cause a
denial of service (NR_MLOCK accounting corruption) via crafted use of mlockall
and munlockall system calls (bnc#1084323).
- CVE-2018-1066: Prevent NULL pointer dereference in
fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allowed an attacker controlling a
CIFS server to kernel panic a client that has this server mounted, because an
empty TargetInfo field in an NTLMSSP setup negotiation response was mishandled
during session recovery (bnc#1083640).
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the kernel
v4l2 video driver (bnc#1072865).
- CVE-2017-16911: The vhci_hcd driver allowed local attackers to disclose
kernel memory addresses. Successful exploitation required that a USB device was
attached over IP (bnc#1078674).
- CVE-2017-15299: The KEYS subsystem mishandled use of add_key for a key that
already exists but is uninstantiated, which allowed local users to cause a
denial of service (NULL pointer dereference and system crash) or possibly have
unspecified other impact via a crafted system call (bnc#1063416).
- CVE-2017-18208: The madvise_willneed function kernel allowed local users to
cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED
for a DAX mapping (bnc#1083494).
- CVE-2018-7566: The ALSA sequencer core initializes the event pool on demand
by invoking snd_seq_pool_init() when the first write happens and the pool is
empty. A user could have reset the pool size manually via ioctl concurrently,
which may have lead UAF or out-of-bound access (bsc#1083483).
- CVE-2017-18204: The ocfs2_setattr function allowed local users to cause a
denial of service (deadlock) via DIO requests (bnc#1083244).
- CVE-2017-16644: The hdpvr_probe function allowed local users to cause a
denial of service (improper error handling and system crash) or possibly have
unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function allowed attackers to cause a denial
of service (integer overflow) or possibly have unspecified other impact by
triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function allowed attackers to
cause a denial of service (NULL pointer dereference) via a specially crafted
USB over IP packet (bnc#1078669).
- CVE-2016-7915: The hid_input_field function allowed physically proximate
attackers to obtain sensitive information from kernel memory or cause a denial
of service (out-of-bounds read) by connecting a device (bnc#1010470).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions did
unbalanced refcounting when a SCSI I/O vector had small consecutive buffers
belonging to the same page. The bio_add_pc_page function merged them into one,
but the page reference was never dropped. This caused a memory leak and
possible system lockup (exploitable against the host OS by a guest OS user, if
a SCSI disk is passed through to a virtual machine) due to an out-of-memory
condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function allowed attackers to cause a denial
of service (out-of-bounds read) via a specially crafted USB over IP packet
(bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function when handling
CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary
memory allocation) via a specially crafted USB over IP packet (bnc#1078672).
- CVE-2018-5332: The rds_message_alloc_sgs() function did not validate a value
that is used during DMA page allocation, leading to a heap-based out-of-bounds
write (related to the rds_rdma_extra_size function in net/rds/rdma.c)
(bnc#1075621).
- CVE-2018-5333: The rds_cmsg_atomic function in net/rds/rdma.c mishandled
cases where page pinning fails or an invalid address is supplied, leading to an
rds_atomic_free_op NULL pointer dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function allowed remote attackers to
cause a denial of service (use-after-free and memory corruption) or possibly
have unspecified other impact by leveraging the presence of xt_TCPMSS in an
iptables action (bnc#1074488).
The following non-security bugs were fixed:
- Fix build on arm64 by defining empty gmb() (bnc#1068032).
- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- KEYS: fix writing past end of user-supplied buffer in keyring_read() (bsc#1066001).
- KEYS: return full count in keyring_read() if buffer is too small (bsc#1066001).
- include/stddef.h: Move offsetofend() from vfio.h to a generic kernel header (bsc#1077560).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- x86/kaiser: use trampoline stack for kernel entry (bsc#1077560)
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- livepatch: __kgr_shadow_get_or_alloc() is local to shadow.c. Shadow variables support (bsc#1082299).
- livepatch: introduce shadow variable API. Shadow variables support (bsc#1082299)
- media: v4l2-compat-ioctl32.c: add missing VIDIOC_PREPARE_BUF (bnc#1012382).
- media: v4l2-compat-ioctl32.c: avoid sizeof(type) (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy clip list in put_v4l2_window32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy m.userptr in put_v4l2_plane32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: do not copy back the result for certain errors (bnc#1012382).
- media: v4l2-compat-ioctl32.c: drop pr_info for unknown buffer type (bnc#1012382).
- media: v4l2-compat-ioctl32.c: fix the indentation (bnc#1012382).
- media: v4l2-compat-ioctl32.c: move 'helper' functions to __get/put_v4l2_format32 (bnc#1012382).
- media: v4l2-compat-ioctl32: Copy v4l2_window->global_alpha (bnc#1012382).
- media: v4l2-ioctl.c: do not copy back the result for -ENOTTY (bnc#1012382).
- netfilter: ebtables: CONFIG_COMPAT: do not trust userland offsets (bsc#1085107).
- netfilter: ebtables: fix erroneous reject of last rule (bsc#1085107).
- packet: only call dev_add_pack() on freshly allocated fanout instances
- pipe: cap initial pipe capacity according to pipe-max-size limit (bsc#1045330).
- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2018-558,SUSE-SLE-SERVER-12-2018-558
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1068: Fixed flaw in the implementation of 32-bit syscall interface\n for bridging. This allowed a privileged user to arbitrarily write to a limited\n range of kernel memory (bnc#1085107).\n- CVE-2017-18221: The __munlock_pagevec function allowed local users to cause a\n denial of service (NR_MLOCK accounting corruption) via crafted use of mlockall\n and munlockall system calls (bnc#1084323).\n- CVE-2018-1066: Prevent NULL pointer dereference in\n fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allowed an attacker controlling a\n CIFS server to kernel panic a client that has this server mounted, because an\n empty TargetInfo field in an NTLMSSP setup negotiation response was mishandled\n during session recovery (bnc#1083640).\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the kernel\n v4l2 video driver (bnc#1072865).\n- CVE-2017-16911: The vhci_hcd driver allowed local attackers to disclose\n kernel memory addresses. Successful exploitation required that a USB device was\n attached over IP (bnc#1078674).\n- CVE-2017-15299: The KEYS subsystem mishandled use of add_key for a key that\n already exists but is uninstantiated, which allowed local users to cause a\n denial of service (NULL pointer dereference and system crash) or possibly have\n unspecified other impact via a crafted system call (bnc#1063416).\n- CVE-2017-18208: The madvise_willneed function kernel allowed local users to\n cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED\n for a DAX mapping (bnc#1083494).\n- CVE-2018-7566: The ALSA sequencer core initializes the event pool on demand\n by invoking snd_seq_pool_init() when the first write happens and the pool is\n empty. A user could have reset the pool size manually via ioctl concurrently,\n which may have lead UAF or out-of-bound access (bsc#1083483).\n- CVE-2017-18204: The ocfs2_setattr function allowed local users to cause a\n denial of service (deadlock) via DIO requests (bnc#1083244).\n- CVE-2017-16644: The hdpvr_probe function allowed local users to cause a\n denial of service (improper error handling and system crash) or possibly have\n unspecified other impact via a crafted USB device (bnc#1067118).\n- CVE-2018-6927: The futex_requeue function allowed attackers to cause a denial\n of service (integer overflow) or possibly have unspecified other impact by\n triggering a negative wake or requeue value (bnc#1080757).\n- CVE-2017-16914: The \u0027stub_send_ret_submit()\u0027 function allowed attackers to\n cause a denial of service (NULL pointer dereference) via a specially crafted\n USB over IP packet (bnc#1078669).\n- CVE-2016-7915: The hid_input_field function allowed physically proximate\n attackers to obtain sensitive information from kernel memory or cause a denial\n of service (out-of-bounds read) by connecting a device (bnc#1010470).\n- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions did\n unbalanced refcounting when a SCSI I/O vector had small consecutive buffers\n belonging to the same page. The bio_add_pc_page function merged them into one,\n but the page reference was never dropped. This caused a memory leak and\n possible system lockup (exploitable against the host OS by a guest OS user, if\n a SCSI disk is passed through to a virtual machine) due to an out-of-memory\n condition (bnc#1062568).\n- CVE-2017-16912: The \u0027get_pipe()\u0027 function allowed attackers to cause a denial\n of service (out-of-bounds read) via a specially crafted USB over IP packet\n (bnc#1078673).\n- CVE-2017-16913: The \u0027stub_recv_cmd_submit()\u0027 function when handling\n CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary\n memory allocation) via a specially crafted USB over IP packet (bnc#1078672).\n- CVE-2018-5332: The rds_message_alloc_sgs() function did not validate a value\n that is used during DMA page allocation, leading to a heap-based out-of-bounds\n write (related to the rds_rdma_extra_size function in net/rds/rdma.c)\n (bnc#1075621).\n- CVE-2018-5333: The rds_cmsg_atomic function in net/rds/rdma.c mishandled\n cases where page pinning fails or an invalid address is supplied, leading to an\n rds_atomic_free_op NULL pointer dereference (bnc#1075617).\n- CVE-2017-18017: The tcpmss_mangle_packet function allowed remote attackers to\n cause a denial of service (use-after-free and memory corruption) or possibly\n have unspecified other impact by leveraging the presence of xt_TCPMSS in an\n iptables action (bnc#1074488).\n\nThe following non-security bugs were fixed:\n\n- Fix build on arm64 by defining empty gmb() (bnc#1068032).\n- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).\n- KEYS: fix writing past end of user-supplied buffer in keyring_read() (bsc#1066001).\n- KEYS: return full count in keyring_read() if buffer is too small (bsc#1066001).\n- include/stddef.h: Move offsetofend() from vfio.h to a generic kernel header (bsc#1077560).\n- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).\n- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).\n- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).\n- x86/kaiser: use trampoline stack for kernel entry (bsc#1077560)\n- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).\n- livepatch: __kgr_shadow_get_or_alloc() is local to shadow.c. Shadow variables support (bsc#1082299).\n- livepatch: introduce shadow variable API. Shadow variables support (bsc#1082299)\n- media: v4l2-compat-ioctl32.c: add missing VIDIOC_PREPARE_BUF (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: avoid sizeof(type) (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: copy clip list in put_v4l2_window32 (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: copy m.userptr in put_v4l2_plane32 (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: do not copy back the result for certain errors (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: drop pr_info for unknown buffer type (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: fix the indentation (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: move \u0027helper\u0027 functions to __get/put_v4l2_format32 (bnc#1012382).\n- media: v4l2-compat-ioctl32: Copy v4l2_window-\u003eglobal_alpha (bnc#1012382).\n- media: v4l2-ioctl.c: do not copy back the result for -ENOTTY (bnc#1012382).\n- netfilter: ebtables: CONFIG_COMPAT: do not trust userland offsets (bsc#1085107).\n- netfilter: ebtables: fix erroneous reject of last rule (bsc#1085107).\n- packet: only call dev_add_pack() on freshly allocated fanout instances\n- pipe: cap initial pipe capacity according to pipe-max-size limit (bsc#1045330).\n- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2018-558,SUSE-SLE-SERVER-12-2018-558", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0834-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0834-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180834-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0834-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003850.html" }, { "category": "self", "summary": "SUSE Bug 1010470", "url": "https://bugzilla.suse.com/1010470" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1045330", "url": "https://bugzilla.suse.com/1045330" }, { "category": "self", "summary": "SUSE Bug 1062568", "url": "https://bugzilla.suse.com/1062568" }, { "category": "self", "summary": "SUSE Bug 1063416", "url": "https://bugzilla.suse.com/1063416" }, { "category": "self", "summary": "SUSE Bug 1066001", "url": "https://bugzilla.suse.com/1066001" }, { "category": "self", "summary": "SUSE Bug 1067118", "url": "https://bugzilla.suse.com/1067118" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1072689", "url": "https://bugzilla.suse.com/1072689" }, { "category": "self", "summary": "SUSE Bug 1072865", "url": "https://bugzilla.suse.com/1072865" }, { "category": "self", "summary": "SUSE Bug 1074488", "url": "https://bugzilla.suse.com/1074488" }, { "category": "self", "summary": "SUSE Bug 1075617", "url": "https://bugzilla.suse.com/1075617" }, { "category": "self", "summary": "SUSE Bug 1075621", "url": "https://bugzilla.suse.com/1075621" }, { "category": "self", "summary": "SUSE Bug 1077560", "url": "https://bugzilla.suse.com/1077560" }, { "category": "self", "summary": "SUSE Bug 1078669", "url": "https://bugzilla.suse.com/1078669" }, { "category": "self", "summary": "SUSE Bug 1078672", "url": "https://bugzilla.suse.com/1078672" }, { "category": "self", "summary": "SUSE Bug 1078673", "url": "https://bugzilla.suse.com/1078673" }, { "category": "self", "summary": "SUSE Bug 1078674", "url": "https://bugzilla.suse.com/1078674" }, { "category": "self", "summary": "SUSE Bug 1080255", "url": "https://bugzilla.suse.com/1080255" }, { "category": "self", "summary": "SUSE Bug 1080464", "url": "https://bugzilla.suse.com/1080464" }, { "category": "self", "summary": "SUSE Bug 1080757", "url": "https://bugzilla.suse.com/1080757" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1083244", "url": "https://bugzilla.suse.com/1083244" }, { "category": "self", "summary": "SUSE Bug 1083483", "url": "https://bugzilla.suse.com/1083483" }, { "category": "self", "summary": "SUSE Bug 1083494", "url": "https://bugzilla.suse.com/1083494" }, { "category": "self", "summary": "SUSE Bug 1083640", "url": "https://bugzilla.suse.com/1083640" }, { "category": "self", "summary": "SUSE Bug 1084323", "url": "https://bugzilla.suse.com/1084323" }, { "category": "self", "summary": "SUSE Bug 1085107", "url": "https://bugzilla.suse.com/1085107" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085279", "url": "https://bugzilla.suse.com/1085279" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7915 page", "url": "https://www.suse.com/security/cve/CVE-2016-7915/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12190 page", "url": "https://www.suse.com/security/cve/CVE-2017-12190/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15299 page", "url": "https://www.suse.com/security/cve/CVE-2017-15299/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16644 page", "url": "https://www.suse.com/security/cve/CVE-2017-16644/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16911 page", "url": "https://www.suse.com/security/cve/CVE-2017-16911/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16912 page", "url": "https://www.suse.com/security/cve/CVE-2017-16912/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16913 page", "url": "https://www.suse.com/security/cve/CVE-2017-16913/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16914 page", "url": "https://www.suse.com/security/cve/CVE-2017-16914/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18017 page", "url": "https://www.suse.com/security/cve/CVE-2017-18017/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18204 page", "url": "https://www.suse.com/security/cve/CVE-2017-18204/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18208 page", "url": "https://www.suse.com/security/cve/CVE-2017-18208/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18221 page", "url": "https://www.suse.com/security/cve/CVE-2017-18221/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1066 page", "url": "https://www.suse.com/security/cve/CVE-2018-1066/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6927 page", "url": "https://www.suse.com/security/cve/CVE-2018-6927/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-03-28T14:17:49Z", "generator": { "date": "2018-03-28T14:17:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0834-1", "initial_release_date": "2018-03-28T14:17:49Z", "revision_history": [ { "date": "2018-03-28T14:17:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.61-52.125.1.noarch", "product": { "name": "kernel-devel-3.12.61-52.125.1.noarch", "product_id": "kernel-devel-3.12.61-52.125.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.61-52.125.1.noarch", "product": { "name": "kernel-macros-3.12.61-52.125.1.noarch", "product_id": "kernel-macros-3.12.61-52.125.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.61-52.125.1.noarch", "product": { "name": "kernel-source-3.12.61-52.125.1.noarch", "product_id": "kernel-source-3.12.61-52.125.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.125.1.ppc64le", "product": { "name": "kernel-default-3.12.61-52.125.1.ppc64le", "product_id": "kernel-default-3.12.61-52.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.125.1.ppc64le", "product": { "name": "kernel-default-base-3.12.61-52.125.1.ppc64le", "product_id": "kernel-default-base-3.12.61-52.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.125.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.61-52.125.1.ppc64le", "product_id": "kernel-default-devel-3.12.61-52.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.125.1.ppc64le", "product": { "name": "kernel-syms-3.12.61-52.125.1.ppc64le", "product_id": "kernel-syms-3.12.61-52.125.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.125.1.s390x", "product": { "name": "kernel-default-3.12.61-52.125.1.s390x", "product_id": "kernel-default-3.12.61-52.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.125.1.s390x", "product": { "name": "kernel-default-base-3.12.61-52.125.1.s390x", "product_id": "kernel-default-base-3.12.61-52.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.125.1.s390x", "product": { "name": "kernel-default-devel-3.12.61-52.125.1.s390x", "product_id": "kernel-default-devel-3.12.61-52.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.61-52.125.1.s390x", "product": { "name": "kernel-default-man-3.12.61-52.125.1.s390x", "product_id": "kernel-default-man-3.12.61-52.125.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.125.1.s390x", "product": { "name": "kernel-syms-3.12.61-52.125.1.s390x", "product_id": "kernel-syms-3.12.61-52.125.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.61-52.125.1.x86_64", "product": { "name": "kernel-ec2-3.12.61-52.125.1.x86_64", "product_id": "kernel-ec2-3.12.61-52.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.61-52.125.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.61-52.125.1.x86_64", "product_id": "kernel-ec2-devel-3.12.61-52.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.61-52.125.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.61-52.125.1.x86_64", "product_id": "kernel-ec2-extra-3.12.61-52.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.61-52.125.1.x86_64", "product": { "name": "kernel-default-3.12.61-52.125.1.x86_64", "product_id": "kernel-default-3.12.61-52.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.125.1.x86_64", "product": { "name": "kernel-default-base-3.12.61-52.125.1.x86_64", "product_id": "kernel-default-base-3.12.61-52.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.125.1.x86_64", "product": { "name": "kernel-default-devel-3.12.61-52.125.1.x86_64", "product_id": "kernel-default-devel-3.12.61-52.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.125.1.x86_64", "product": { "name": "kernel-syms-3.12.61-52.125.1.x86_64", "product_id": "kernel-syms-3.12.61-52.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.61-52.125.1.x86_64", "product": { "name": "kernel-xen-3.12.61-52.125.1.x86_64", "product_id": "kernel-xen-3.12.61-52.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.61-52.125.1.x86_64", "product": { "name": "kernel-xen-base-3.12.61-52.125.1.x86_64", "product_id": "kernel-xen-base-3.12.61-52.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.61-52.125.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.61-52.125.1.x86_64", "product_id": "kernel-xen-devel-3.12.61-52.125.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.61-52.125.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64" }, "product_reference": "kernel-ec2-3.12.61-52.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.61-52.125.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.61-52.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.61-52.125.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.61-52.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.125.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le" }, "product_reference": "kernel-default-3.12.61-52.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.125.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x" }, "product_reference": "kernel-default-3.12.61-52.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.125.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.125.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.61-52.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.125.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x" }, "product_reference": "kernel-default-base-3.12.61-52.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.125.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.125.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.61-52.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.125.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x" }, "product_reference": "kernel-default-devel-3.12.61-52.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.125.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.61-52.125.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x" }, "product_reference": "kernel-default-man-3.12.61-52.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.125.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.125.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.125.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.125.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le" }, "product_reference": "kernel-syms-3.12.61-52.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.125.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x" }, "product_reference": "kernel-syms-3.12.61-52.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.125.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.125.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.125.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.125.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7915" } ], "notes": [ { "category": "general", "text": "The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7915", "url": "https://www.suse.com/security/cve/CVE-2016-7915" }, { "category": "external", "summary": "SUSE Bug 1010470 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1010470" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "moderate" } ], "title": "CVE-2016-7915" }, { "cve": "CVE-2017-12190", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12190" } ], "notes": [ { "category": "general", "text": "The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12190", "url": "https://www.suse.com/security/cve/CVE-2017-12190" }, { "category": "external", "summary": "SUSE Bug 1062568 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1062568" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "moderate" } ], "title": "CVE-2017-12190" }, { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2017-15299", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15299" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel through 4.13.7 mishandles use of add_key for a key that already exists but is uninstantiated, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15299", "url": "https://www.suse.com/security/cve/CVE-2017-15299" }, { "category": "external", "summary": "SUSE Bug 1063416 for CVE-2017-15299", "url": "https://bugzilla.suse.com/1063416" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "moderate" } ], "title": "CVE-2017-15299" }, { "cve": "CVE-2017-16644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16644" } ], "notes": [ { "category": "general", "text": "The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16644", "url": "https://www.suse.com/security/cve/CVE-2017-16644" }, { "category": "external", "summary": "SUSE Bug 1067118 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1067118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "moderate" } ], "title": "CVE-2017-16644" }, { "cve": "CVE-2017-16911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16911" } ], "notes": [ { "category": "general", "text": "The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16911", "url": "https://www.suse.com/security/cve/CVE-2017-16911" }, { "category": "external", "summary": "SUSE Bug 1078674 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1078674" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "low" } ], "title": "CVE-2017-16911" }, { "cve": "CVE-2017-16912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16912" } ], "notes": [ { "category": "general", "text": "The \"get_pipe()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16912", "url": "https://www.suse.com/security/cve/CVE-2017-16912" }, { "category": "external", "summary": "SUSE Bug 1078673 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1078673" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "moderate" } ], "title": "CVE-2017-16912" }, { "cve": "CVE-2017-16913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16913" } ], "notes": [ { "category": "general", "text": "The \"stub_recv_cmd_submit()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16913", "url": "https://www.suse.com/security/cve/CVE-2017-16913" }, { "category": "external", "summary": "SUSE Bug 1078672 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1078672" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "moderate" } ], "title": "CVE-2017-16913" }, { "cve": "CVE-2017-16914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16914" } ], "notes": [ { "category": "general", "text": "The \"stub_send_ret_submit()\" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16914", "url": "https://www.suse.com/security/cve/CVE-2017-16914" }, { "category": "external", "summary": "SUSE Bug 1078669 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1078669" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "low" } ], "title": "CVE-2017-16914" }, { "cve": "CVE-2017-18017", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18017" } ], "notes": [ { "category": "general", "text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18017", "url": "https://www.suse.com/security/cve/CVE-2017-18017" }, { "category": "external", "summary": "SUSE Bug 1074488 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1074488" }, { "category": "external", "summary": "SUSE Bug 1080255 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1080255" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2017-18017", "url": "https://bugzilla.suse.com/971126" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "important" } ], "title": "CVE-2017-18017" }, { "cve": "CVE-2017-18204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18204" } ], "notes": [ { "category": "general", "text": "The ocfs2_setattr function in fs/ocfs2/file.c in the Linux kernel before 4.14.2 allows local users to cause a denial of service (deadlock) via DIO requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18204", "url": "https://www.suse.com/security/cve/CVE-2017-18204" }, { "category": "external", "summary": "SUSE Bug 1083244 for CVE-2017-18204", "url": "https://bugzilla.suse.com/1083244" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "moderate" } ], "title": "CVE-2017-18204" }, { "cve": "CVE-2017-18208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18208" } ], "notes": [ { "category": "general", "text": "The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18208", "url": "https://www.suse.com/security/cve/CVE-2017-18208" }, { "category": "external", "summary": "SUSE Bug 1083494 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1083494" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "moderate" } ], "title": "CVE-2017-18208" }, { "cve": "CVE-2017-18221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18221" } ], "notes": [ { "category": "general", "text": "The __munlock_pagevec function in mm/mlock.c in the Linux kernel before 4.11.4 allows local users to cause a denial of service (NR_MLOCK accounting corruption) via crafted use of mlockall and munlockall system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18221", "url": "https://www.suse.com/security/cve/CVE-2017-18221" }, { "category": "external", "summary": "SUSE Bug 1084323 for CVE-2017-18221", "url": "https://bugzilla.suse.com/1084323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "moderate" } ], "title": "CVE-2017-18221" }, { "cve": "CVE-2018-1066", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1066" } ], "notes": [ { "category": "general", "text": "The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1066", "url": "https://www.suse.com/security/cve/CVE-2018-1066" }, { "category": "external", "summary": "SUSE Bug 1083640 for CVE-2018-1066", "url": "https://bugzilla.suse.com/1083640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "moderate" } ], "title": "CVE-2018-1066" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-6927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6927" } ], "notes": [ { "category": "general", "text": "The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6927", "url": "https://www.suse.com/security/cve/CVE-2018-6927" }, { "category": "external", "summary": "SUSE Bug 1080757 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1080757" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "moderate" } ], "title": "CVE-2018-6927" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.125.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.125.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-28T14:17:49Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0992-1
Vulnerability from csaf_suse
Published
2018-04-20 08:25
Modified
2018-04-20 08:25
Summary
Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_51 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SAP-12-SP1-2018-686,SUSE-SLE-SERVER-12-SP1-2018-686
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_51 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-686,SUSE-SLE-SERVER-12-SP1-2018-686", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0992-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0992-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180992-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0992-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003908.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-04-20T08:25:42Z", "generator": { "date": "2018-04-20T08:25:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0992-1", "initial_release_date": "2018-04-20T08:25:42Z", "revision_history": [ { "date": "2018-04-20T08:25:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:42Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:42Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:42Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:42Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1016-1
Vulnerability from csaf_suse
Published
2018-04-20 08:34
Modified
2018-04-20 08:34
Summary
Security update for the Linux Kernel (Live Patch 31 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 31 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_119 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: The Linux kernel had a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
Patchnames
SUSE-SLE-SERVER-12-2018-710
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 31 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_119 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: The Linux kernel had a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-710", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1016-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1016-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181016-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1016-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003932.html" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 31 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:34:58Z", "generator": { "date": "2018-04-20T08:34:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1016-1", "initial_release_date": "2018-04-20T08:34:58Z", "revision_history": [ { "date": "2018-04-20T08:34:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:58Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:58Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:58Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1006-1
Vulnerability from csaf_suse
Published
2018-04-20 08:33
Modified
2018-04-20 08:33
Summary
Security update for the Linux Kernel (Live Patch 23 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 23 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_80 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SERVER-12-2018-701
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 23 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_80 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-701", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1006-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1006-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181006-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1006-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003922.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 23 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:33:55Z", "generator": { "date": "2018-04-20T08:33:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1006-1", "initial_release_date": "2018-04-20T08:33:55Z", "revision_history": [ { "date": "2018-04-20T08:33:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:33:55Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:33:55Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:33:55Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:33:55Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1033-1
Vulnerability from csaf_suse
Published
2018-04-20 08:20
Modified
2018-04-20 08:20
Summary
Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.74-92_29 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-669,SUSE-SLE-SERVER-12-SP2-2018-669
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_29 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-669,SUSE-SLE-SERVER-12-SP2-2018-669", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1033-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1033-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181033-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1033-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003948.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T08:20:52Z", "generator": { "date": "2018-04-20T08:20:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1033-1", "initial_release_date": "2018-04-20T08:20:52Z", "revision_history": [ { "date": "2018-04-20T08:20:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "product_id": "kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:52Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:52Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:52Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:52Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0991-1
Vulnerability from csaf_suse
Published
2018-04-20 08:27
Modified
2018-04-20 08:27
Summary
Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_85 fixes one issue.
The following security issue was fixed:
- CVE-2018-7566: The Linux kernel had a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-696,SUSE-SLE-SERVER-12-SP1-2018-696
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_85 fixes one issue.\n\nThe following security issue was fixed:\n\n- CVE-2018-7566: The Linux kernel had a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-696,SUSE-SLE-SERVER-12-SP1-2018-696", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0991-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0991-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180991-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0991-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003907.html" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-04-20T08:27:10Z", "generator": { "date": "2018-04-20T08:27:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0991-1", "initial_release_date": "2018-04-20T08:27:10Z", "revision_history": [ { "date": "2018-04-20T08:27:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:27:10Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1024-1
Vulnerability from csaf_suse
Published
2018-04-20 08:25
Modified
2018-04-20 08:25
Summary
Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.82-6_3 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-684
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.82-6_3 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-684", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1024-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1024-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181024-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1024-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003939.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-04-20T08:25:24Z", "generator": { "date": "2018-04-20T08:25:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1024-1", "initial_release_date": "2018-04-20T08:25:24Z", "revision_history": [ { "date": "2018-04-20T08:25:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:24Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:24Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:24Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:24Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0848-1
Vulnerability from csaf_suse
Published
2018-03-29 12:28
Modified
2018-03-29 12:28
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-1068: Fixed flaw in the implementation of 32-bit syscall interface
for bridging. This allowed a privileged user to arbitrarily write to a limited
range of kernel memory (bnc#1085107).
- CVE-2017-18221: The __munlock_pagevec function allowed local users to cause a
denial of service (NR_MLOCK accounting corruption) via crafted use of mlockall
and munlockall system calls (bnc#1084323).
- CVE-2018-1066: Prevent NULL pointer dereference in
fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allowed an attacker controlling a
CIFS server to kernel panic a client that has this server mounted, because an
empty TargetInfo field in an NTLMSSP setup negotiation response was mishandled
during session recovery (bnc#1083640).
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the kernel
v4l2 video driver (bnc#1072865).
- CVE-2017-16911: The vhci_hcd driver allowed local attackers to disclose
kernel memory addresses. Successful exploitation required that a USB device was
attached over IP (bnc#1078674).
- CVE-2017-15299: The KEYS subsystem mishandled use of add_key for a key that
already exists but is uninstantiated, which allowed local users to cause a
denial of service (NULL pointer dereference and system crash) or possibly have
unspecified other impact via a crafted system call (bnc#1063416).
- CVE-2017-18208: The madvise_willneed function kernel allowed local users to
cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED
for a DAX mapping (bnc#1083494).
- CVE-2018-7566: The ALSA sequencer core initializes the event pool on demand
by invoking snd_seq_pool_init() when the first write happens and the pool is
empty. A user could have reset the pool size manually via ioctl concurrently,
which may have lead UAF or out-of-bound access (bsc#1083483).
- CVE-2017-18204: The ocfs2_setattr function allowed local users to cause a
denial of service (deadlock) via DIO requests (bnc#1083244).
- CVE-2017-16644: The hdpvr_probe function allowed local users to cause a
denial of service (improper error handling and system crash) or possibly have
unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function allowed attackers to cause a denial
of service (integer overflow) or possibly have unspecified other impact by
triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function allowed attackers to
cause a denial of service (NULL pointer dereference) via a specially crafted
USB over IP packet (bnc#1078669).
- CVE-2016-7915: The hid_input_field function allowed physically proximate
attackers to obtain sensitive information from kernel memory or cause a denial
of service (out-of-bounds read) by connecting a device (bnc#1010470).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions did
unbalanced refcounting when a SCSI I/O vector had small consecutive buffers
belonging to the same page. The bio_add_pc_page function merged them into one,
but the page reference was never dropped. This caused a memory leak and
possible system lockup (exploitable against the host OS by a guest OS user, if
a SCSI disk is passed through to a virtual machine) due to an out-of-memory
condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function allowed attackers to cause a denial
of service (out-of-bounds read) via a specially crafted USB over IP packet
(bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function when handling
CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary
memory allocation) via a specially crafted USB over IP packet (bnc#1078672).
- CVE-2018-5332: The rds_message_alloc_sgs() function did not validate a value
that is used during DMA page allocation, leading to a heap-based out-of-bounds
write (related to the rds_rdma_extra_size function in net/rds/rdma.c)
(bnc#1075621).
- CVE-2018-5333: The rds_cmsg_atomic function in net/rds/rdma.c mishandled
cases where page pinning fails or an invalid address is supplied, leading to an
rds_atomic_free_op NULL pointer dereference (bnc#1075617).
- CVE-2017-18017: The tcpmss_mangle_packet function allowed remote attackers to
cause a denial of service (use-after-free and memory corruption) or possibly
have unspecified other impact by leveraging the presence of xt_TCPMSS in an
iptables action (bnc#1074488).
The following non-security bugs were fixed:
- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- KEYS: fix writing past end of user-supplied buffer in keyring_read() (bsc#1066001).
- KEYS: return full count in keyring_read() if buffer is too small (bsc#1066001).
- NFS: Add a cond_resched() to nfs_commit_release_pages() (bsc#1077779).
- btrfs: qgroup: move noisy underflow warning to debugging build (bsc#1055755 and bsc#1080287).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- x86/kaiser: use trampoline stack for kernel entry (bsc#1077560)
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- livepatch: __kgr_shadow_get_or_alloc() is local to shadow.c. Shadow variables support (bsc#1082299).
- livepatch: introduce shadow variable API. Shadow variables support (bsc#1082299)
- media: v4l2-compat-ioctl32.c: add missing VIDIOC_PREPARE_BUF (bnc#1012382).
- media: v4l2-compat-ioctl32.c: avoid sizeof(type) (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy clip list in put_v4l2_window32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: copy m.userptr in put_v4l2_plane32 (bnc#1012382).
- media: v4l2-compat-ioctl32.c: do not copy back the result for certain errors (bnc#1012382).
- media: v4l2-compat-ioctl32.c: drop pr_info for unknown buffer type (bnc#1012382).
- media: v4l2-compat-ioctl32.c: fix the indentation (bnc#1012382).
- media: v4l2-compat-ioctl32.c: move 'helper' functions to __get/put_v4l2_format32 (bnc#1012382).
- media: v4l2-compat-ioctl32: Copy v4l2_window->global_alpha (bnc#1012382).
- media: v4l2-ioctl.c: do not copy back the result for -ENOTTY (bnc#1012382).
- netfilter: ebtables: CONFIG_COMPAT: do not trust userland offsets (bsc#1085107).
- netfilter: ebtables: fix erroneous reject of last rule (bsc#1085107).
- packet: only call dev_add_pack() on freshly allocated fanout instances
- pipe: cap initial pipe capacity according to pipe-max-size limit (bsc#1045330).
- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1077182).
- powerpc/numa: Invalidate numa_cpu_lookup_table on cpu remove (bsc#1081512).
- powerpc/powernv: Support firmware disable of RFI flush (bsc#1068032, bsc#1077182).
- powerpc/powernv: Support firmware disable of RFI flush (bsc#1068032, bsc#1077182).
- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1077182).
- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1077182).
- rfi-flush: Move the logic to avoid a redo into the debugfs code (bsc#1068032, bsc#1077182).
- rfi-flush: Switch to new linear fallback flush (bsc#1068032, bsc#1077182).
Patchnames
SUSE-OpenStack-Cloud-6-2018-568,SUSE-SLE-Module-Public-Cloud-12-2018-568,SUSE-SLE-SAP-12-SP1-2018-568,SUSE-SLE-SERVER-12-SP1-2018-568
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1068: Fixed flaw in the implementation of 32-bit syscall interface\n for bridging. This allowed a privileged user to arbitrarily write to a limited\n range of kernel memory (bnc#1085107).\n- CVE-2017-18221: The __munlock_pagevec function allowed local users to cause a\n denial of service (NR_MLOCK accounting corruption) via crafted use of mlockall\n and munlockall system calls (bnc#1084323).\n- CVE-2018-1066: Prevent NULL pointer dereference in\n fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allowed an attacker controlling a\n CIFS server to kernel panic a client that has this server mounted, because an\n empty TargetInfo field in an NTLMSSP setup negotiation response was mishandled\n during session recovery (bnc#1083640).\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the kernel\n v4l2 video driver (bnc#1072865).\n- CVE-2017-16911: The vhci_hcd driver allowed local attackers to disclose\n kernel memory addresses. Successful exploitation required that a USB device was\n attached over IP (bnc#1078674).\n- CVE-2017-15299: The KEYS subsystem mishandled use of add_key for a key that\n already exists but is uninstantiated, which allowed local users to cause a\n denial of service (NULL pointer dereference and system crash) or possibly have\n unspecified other impact via a crafted system call (bnc#1063416).\n- CVE-2017-18208: The madvise_willneed function kernel allowed local users to\n cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED\n for a DAX mapping (bnc#1083494).\n- CVE-2018-7566: The ALSA sequencer core initializes the event pool on demand\n by invoking snd_seq_pool_init() when the first write happens and the pool is\n empty. A user could have reset the pool size manually via ioctl concurrently,\n which may have lead UAF or out-of-bound access (bsc#1083483).\n- CVE-2017-18204: The ocfs2_setattr function allowed local users to cause a\n denial of service (deadlock) via DIO requests (bnc#1083244).\n- CVE-2017-16644: The hdpvr_probe function allowed local users to cause a\n denial of service (improper error handling and system crash) or possibly have\n unspecified other impact via a crafted USB device (bnc#1067118).\n- CVE-2018-6927: The futex_requeue function allowed attackers to cause a denial\n of service (integer overflow) or possibly have unspecified other impact by\n triggering a negative wake or requeue value (bnc#1080757).\n- CVE-2017-16914: The \u0027stub_send_ret_submit()\u0027 function allowed attackers to\n cause a denial of service (NULL pointer dereference) via a specially crafted\n USB over IP packet (bnc#1078669).\n- CVE-2016-7915: The hid_input_field function allowed physically proximate\n attackers to obtain sensitive information from kernel memory or cause a denial\n of service (out-of-bounds read) by connecting a device (bnc#1010470).\n- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions did\n unbalanced refcounting when a SCSI I/O vector had small consecutive buffers\n belonging to the same page. The bio_add_pc_page function merged them into one,\n but the page reference was never dropped. This caused a memory leak and\n possible system lockup (exploitable against the host OS by a guest OS user, if\n a SCSI disk is passed through to a virtual machine) due to an out-of-memory\n condition (bnc#1062568).\n- CVE-2017-16912: The \u0027get_pipe()\u0027 function allowed attackers to cause a denial\n of service (out-of-bounds read) via a specially crafted USB over IP packet\n (bnc#1078673).\n- CVE-2017-16913: The \u0027stub_recv_cmd_submit()\u0027 function when handling\n CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary\n memory allocation) via a specially crafted USB over IP packet (bnc#1078672).\n- CVE-2018-5332: The rds_message_alloc_sgs() function did not validate a value\n that is used during DMA page allocation, leading to a heap-based out-of-bounds\n write (related to the rds_rdma_extra_size function in net/rds/rdma.c)\n (bnc#1075621).\n- CVE-2018-5333: The rds_cmsg_atomic function in net/rds/rdma.c mishandled\n cases where page pinning fails or an invalid address is supplied, leading to an\n rds_atomic_free_op NULL pointer dereference (bnc#1075617).\n- CVE-2017-18017: The tcpmss_mangle_packet function allowed remote attackers to\n cause a denial of service (use-after-free and memory corruption) or possibly\n have unspecified other impact by leveraging the presence of xt_TCPMSS in an\n iptables action (bnc#1074488).\n \nThe following non-security bugs were fixed:\n\n- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).\n- KEYS: fix writing past end of user-supplied buffer in keyring_read() (bsc#1066001).\n- KEYS: return full count in keyring_read() if buffer is too small (bsc#1066001).\n- NFS: Add a cond_resched() to nfs_commit_release_pages() (bsc#1077779).\n- btrfs: qgroup: move noisy underflow warning to debugging build (bsc#1055755 and bsc#1080287).\n- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).\n- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).\n- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).\n- x86/kaiser: use trampoline stack for kernel entry (bsc#1077560)\n- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).\n- livepatch: __kgr_shadow_get_or_alloc() is local to shadow.c. Shadow variables support (bsc#1082299).\n- livepatch: introduce shadow variable API. Shadow variables support (bsc#1082299)\n- media: v4l2-compat-ioctl32.c: add missing VIDIOC_PREPARE_BUF (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: avoid sizeof(type) (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: copy clip list in put_v4l2_window32 (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: copy m.userptr in put_v4l2_plane32 (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: do not copy back the result for certain errors (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: drop pr_info for unknown buffer type (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: fix the indentation (bnc#1012382).\n- media: v4l2-compat-ioctl32.c: move \u0027helper\u0027 functions to __get/put_v4l2_format32 (bnc#1012382).\n- media: v4l2-compat-ioctl32: Copy v4l2_window-\u003eglobal_alpha (bnc#1012382).\n- media: v4l2-ioctl.c: do not copy back the result for -ENOTTY (bnc#1012382).\n- netfilter: ebtables: CONFIG_COMPAT: do not trust userland offsets (bsc#1085107).\n- netfilter: ebtables: fix erroneous reject of last rule (bsc#1085107).\n- packet: only call dev_add_pack() on freshly allocated fanout instances\n- pipe: cap initial pipe capacity according to pipe-max-size limit (bsc#1045330).\n- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1077182).\n- powerpc/numa: Invalidate numa_cpu_lookup_table on cpu remove (bsc#1081512).\n- powerpc/powernv: Support firmware disable of RFI flush (bsc#1068032, bsc#1077182).\n- powerpc/powernv: Support firmware disable of RFI flush (bsc#1068032, bsc#1077182).\n- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1077182).\n- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1077182).\n- rfi-flush: Move the logic to avoid a redo into the debugfs code (bsc#1068032, bsc#1077182).\n- rfi-flush: Switch to new linear fallback flush (bsc#1068032, bsc#1077182).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-6-2018-568,SUSE-SLE-Module-Public-Cloud-12-2018-568,SUSE-SLE-SAP-12-SP1-2018-568,SUSE-SLE-SERVER-12-SP1-2018-568", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0848-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0848-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180848-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0848-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-March/003857.html" }, { "category": "self", "summary": "SUSE Bug 1010470", "url": "https://bugzilla.suse.com/1010470" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1045330", "url": "https://bugzilla.suse.com/1045330" }, { "category": "self", "summary": "SUSE Bug 1055755", "url": "https://bugzilla.suse.com/1055755" }, { "category": "self", "summary": "SUSE Bug 1062568", "url": "https://bugzilla.suse.com/1062568" }, { "category": "self", "summary": "SUSE Bug 1063416", "url": "https://bugzilla.suse.com/1063416" }, { "category": "self", "summary": "SUSE Bug 1066001", "url": "https://bugzilla.suse.com/1066001" }, { "category": "self", "summary": "SUSE Bug 1067118", "url": "https://bugzilla.suse.com/1067118" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1072689", "url": "https://bugzilla.suse.com/1072689" }, { "category": "self", "summary": "SUSE Bug 1072865", "url": "https://bugzilla.suse.com/1072865" }, { "category": "self", "summary": "SUSE Bug 1074488", "url": "https://bugzilla.suse.com/1074488" }, { "category": "self", "summary": "SUSE Bug 1075617", "url": "https://bugzilla.suse.com/1075617" }, { "category": "self", "summary": "SUSE Bug 1075621", "url": "https://bugzilla.suse.com/1075621" }, { "category": "self", "summary": "SUSE Bug 1077182", "url": "https://bugzilla.suse.com/1077182" }, { "category": "self", "summary": "SUSE Bug 1077560", "url": "https://bugzilla.suse.com/1077560" }, { "category": "self", "summary": "SUSE Bug 1077779", "url": "https://bugzilla.suse.com/1077779" }, { "category": "self", "summary": "SUSE Bug 1078669", "url": "https://bugzilla.suse.com/1078669" }, { "category": "self", "summary": "SUSE Bug 1078672", "url": "https://bugzilla.suse.com/1078672" }, { "category": "self", "summary": "SUSE Bug 1078673", "url": "https://bugzilla.suse.com/1078673" }, { "category": "self", "summary": "SUSE Bug 1078674", "url": "https://bugzilla.suse.com/1078674" }, { "category": "self", "summary": "SUSE Bug 1080255", "url": "https://bugzilla.suse.com/1080255" }, { "category": "self", "summary": "SUSE Bug 1080287", "url": "https://bugzilla.suse.com/1080287" }, { "category": "self", "summary": "SUSE Bug 1080464", "url": "https://bugzilla.suse.com/1080464" }, { "category": "self", "summary": "SUSE Bug 1080757", "url": "https://bugzilla.suse.com/1080757" }, { "category": "self", "summary": "SUSE Bug 1081512", "url": "https://bugzilla.suse.com/1081512" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1083244", "url": "https://bugzilla.suse.com/1083244" }, { "category": "self", "summary": "SUSE Bug 1083483", "url": "https://bugzilla.suse.com/1083483" }, { "category": "self", "summary": "SUSE Bug 1083494", "url": "https://bugzilla.suse.com/1083494" }, { "category": "self", "summary": "SUSE Bug 1083640", "url": "https://bugzilla.suse.com/1083640" }, { "category": "self", "summary": "SUSE Bug 1084323", "url": "https://bugzilla.suse.com/1084323" }, { "category": "self", "summary": "SUSE Bug 1085107", "url": "https://bugzilla.suse.com/1085107" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7915 page", "url": "https://www.suse.com/security/cve/CVE-2016-7915/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12190 page", "url": "https://www.suse.com/security/cve/CVE-2017-12190/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15299 page", "url": "https://www.suse.com/security/cve/CVE-2017-15299/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16644 page", "url": "https://www.suse.com/security/cve/CVE-2017-16644/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16911 page", "url": "https://www.suse.com/security/cve/CVE-2017-16911/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16912 page", "url": "https://www.suse.com/security/cve/CVE-2017-16912/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16913 page", "url": "https://www.suse.com/security/cve/CVE-2017-16913/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16914 page", "url": "https://www.suse.com/security/cve/CVE-2017-16914/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18017 page", "url": "https://www.suse.com/security/cve/CVE-2017-18017/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18204 page", "url": "https://www.suse.com/security/cve/CVE-2017-18204/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18208 page", "url": "https://www.suse.com/security/cve/CVE-2017-18208/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18221 page", "url": "https://www.suse.com/security/cve/CVE-2017-18221/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1066 page", "url": "https://www.suse.com/security/cve/CVE-2018-1066/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6927 page", "url": "https://www.suse.com/security/cve/CVE-2018-6927/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-03-29T12:28:31Z", "generator": { "date": "2018-03-29T12:28:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0848-1", "initial_release_date": "2018-03-29T12:28:31Z", "revision_history": [ { "date": "2018-03-29T12:28:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.85.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.85.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.85.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.85.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.85.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.85.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.85.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.85.1.noarch", "product_id": "kernel-source-3.12.74-60.64.85.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.85.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.85.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.85.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.85.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.85.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.85.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.85.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.85.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.85.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.85.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.85.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.85.1.s390x", "product_id": "kernel-default-3.12.74-60.64.85.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.85.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.85.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.85.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.85.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.85.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.85.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.85.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.85.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.85.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.85.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.85.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.85.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.85.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.85.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.85.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.85.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.85.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.85.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.85.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.85.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.85.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.85.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.85.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.85.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.85.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.85.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.85.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.85.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 6", "product": { "name": "SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.85.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.85.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.85.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.85.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.85.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.85.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.85.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.85.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.85.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.85.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.85.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.85.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.85.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.85.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.85.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.85.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.85.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.85.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.85.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.85.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.85.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.85.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.85.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.85.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.85.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.85.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.85.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.85.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.85.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.85.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.85.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.85.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.85.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.85.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.85.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.85.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.85.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7915" } ], "notes": [ { "category": "general", "text": "The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7915", "url": "https://www.suse.com/security/cve/CVE-2016-7915" }, { "category": "external", "summary": "SUSE Bug 1010470 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1010470" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "moderate" } ], "title": "CVE-2016-7915" }, { "cve": "CVE-2017-12190", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12190" } ], "notes": [ { "category": "general", "text": "The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12190", "url": "https://www.suse.com/security/cve/CVE-2017-12190" }, { "category": "external", "summary": "SUSE Bug 1062568 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1062568" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "moderate" } ], "title": "CVE-2017-12190" }, { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2017-15299", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15299" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel through 4.13.7 mishandles use of add_key for a key that already exists but is uninstantiated, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15299", "url": "https://www.suse.com/security/cve/CVE-2017-15299" }, { "category": "external", "summary": "SUSE Bug 1063416 for CVE-2017-15299", "url": "https://bugzilla.suse.com/1063416" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "moderate" } ], "title": "CVE-2017-15299" }, { "cve": "CVE-2017-16644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16644" } ], "notes": [ { "category": "general", "text": "The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16644", "url": "https://www.suse.com/security/cve/CVE-2017-16644" }, { "category": "external", "summary": "SUSE Bug 1067118 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1067118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "moderate" } ], "title": "CVE-2017-16644" }, { "cve": "CVE-2017-16911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16911" } ], "notes": [ { "category": "general", "text": "The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16911", "url": "https://www.suse.com/security/cve/CVE-2017-16911" }, { "category": "external", "summary": "SUSE Bug 1078674 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1078674" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "low" } ], "title": "CVE-2017-16911" }, { "cve": "CVE-2017-16912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16912" } ], "notes": [ { "category": "general", "text": "The \"get_pipe()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16912", "url": "https://www.suse.com/security/cve/CVE-2017-16912" }, { "category": "external", "summary": "SUSE Bug 1078673 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1078673" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "moderate" } ], "title": "CVE-2017-16912" }, { "cve": "CVE-2017-16913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16913" } ], "notes": [ { "category": "general", "text": "The \"stub_recv_cmd_submit()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16913", "url": "https://www.suse.com/security/cve/CVE-2017-16913" }, { "category": "external", "summary": "SUSE Bug 1078672 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1078672" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "moderate" } ], "title": "CVE-2017-16913" }, { "cve": "CVE-2017-16914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16914" } ], "notes": [ { "category": "general", "text": "The \"stub_send_ret_submit()\" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16914", "url": "https://www.suse.com/security/cve/CVE-2017-16914" }, { "category": "external", "summary": "SUSE Bug 1078669 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1078669" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "low" } ], "title": "CVE-2017-16914" }, { "cve": "CVE-2017-18017", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18017" } ], "notes": [ { "category": "general", "text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18017", "url": "https://www.suse.com/security/cve/CVE-2017-18017" }, { "category": "external", "summary": "SUSE Bug 1074488 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1074488" }, { "category": "external", "summary": "SUSE Bug 1080255 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1080255" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-18017", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2017-18017", "url": "https://bugzilla.suse.com/971126" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "important" } ], "title": "CVE-2017-18017" }, { "cve": "CVE-2017-18204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18204" } ], "notes": [ { "category": "general", "text": "The ocfs2_setattr function in fs/ocfs2/file.c in the Linux kernel before 4.14.2 allows local users to cause a denial of service (deadlock) via DIO requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18204", "url": "https://www.suse.com/security/cve/CVE-2017-18204" }, { "category": "external", "summary": "SUSE Bug 1083244 for CVE-2017-18204", "url": "https://bugzilla.suse.com/1083244" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "moderate" } ], "title": "CVE-2017-18204" }, { "cve": "CVE-2017-18208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18208" } ], "notes": [ { "category": "general", "text": "The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18208", "url": "https://www.suse.com/security/cve/CVE-2017-18208" }, { "category": "external", "summary": "SUSE Bug 1083494 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1083494" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "moderate" } ], "title": "CVE-2017-18208" }, { "cve": "CVE-2017-18221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18221" } ], "notes": [ { "category": "general", "text": "The __munlock_pagevec function in mm/mlock.c in the Linux kernel before 4.11.4 allows local users to cause a denial of service (NR_MLOCK accounting corruption) via crafted use of mlockall and munlockall system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18221", "url": "https://www.suse.com/security/cve/CVE-2017-18221" }, { "category": "external", "summary": "SUSE Bug 1084323 for CVE-2017-18221", "url": "https://bugzilla.suse.com/1084323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "moderate" } ], "title": "CVE-2017-18221" }, { "cve": "CVE-2018-1066", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1066" } ], "notes": [ { "category": "general", "text": "The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1066", "url": "https://www.suse.com/security/cve/CVE-2018-1066" }, { "category": "external", "summary": "SUSE Bug 1083640 for CVE-2018-1066", "url": "https://bugzilla.suse.com/1083640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "moderate" } ], "title": "CVE-2018-1066" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-6927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6927" } ], "notes": [ { "category": "general", "text": "The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6927", "url": "https://www.suse.com/security/cve/CVE-2018-6927" }, { "category": "external", "summary": "SUSE Bug 1080757 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1080757" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "moderate" } ], "title": "CVE-2018-6927" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.85.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.85.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_85-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-03-29T12:28:31Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1010-1
Vulnerability from csaf_suse
Published
2018-04-20 08:33
Modified
2018-04-20 08:33
Summary
Security update for the Linux Kernel (Live Patch 21 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 21 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_72 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SERVER-12-2018-700
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 21 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_72 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-700", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1010-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1010-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181010-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1010-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 21 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:33:46Z", "generator": { "date": "2018-04-20T08:33:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1010-1", "initial_release_date": "2018-04-20T08:33:46Z", "revision_history": [ { "date": "2018-04-20T08:33:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:33:46Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:33:46Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:33:46Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:33:46Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1031-1
Vulnerability from csaf_suse
Published
2018-04-20 08:21
Modified
2018-04-20 08:21
Summary
Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.103-92_56 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-671,SUSE-SLE-SERVER-12-SP2-2018-671
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-92_56 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-671,SUSE-SLE-SERVER-12-SP2-2018-671", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1031-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1031-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181031-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1031-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003946.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T08:21:40Z", "generator": { "date": "2018-04-20T08:21:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1031-1", "initial_release_date": "2018-04-20T08:21:40Z", "revision_history": [ { "date": "2018-04-20T08:21:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "product_id": "kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:21:40Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:21:40Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:21:40Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:21:40Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1003-1
Vulnerability from csaf_suse
Published
2018-04-20 08:22
Modified
2018-04-20 08:22
Summary
Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.114-92_67 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-673,SUSE-SLE-SERVER-12-SP2-2018-673
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-92_67 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-673,SUSE-SLE-SERVER-12-SP2-2018-673", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1003-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1003-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181003-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1003-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003919.html" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T08:22:32Z", "generator": { "date": "2018-04-20T08:22:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1003-1", "initial_release_date": "2018-04-20T08:22:32Z", "revision_history": [ { "date": "2018-04-20T08:22:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:22:32Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:22:32Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:22:32Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1019-1
Vulnerability from csaf_suse
Published
2018-04-20 09:45
Modified
2018-04-20 09:45
Summary
Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.59-92_20 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-711,SUSE-SLE-SERVER-12-SP2-2018-711
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.59-92_20 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-711,SUSE-SLE-SERVER-12-SP2-2018-711", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1019-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1019-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181019-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1019-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003934.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T09:45:35Z", "generator": { "date": "2018-04-20T09:45:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1019-1", "initial_release_date": "2018-04-20T09:45:35Z", "revision_history": [ { "date": "2018-04-20T09:45:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "product_id": "kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T09:45:35Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T09:45:35Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T09:45:35Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-10-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T09:45:35Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1004-1
Vulnerability from csaf_suse
Published
2018-04-20 08:21
Modified
2018-04-20 08:21
Summary
Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.103-92_53 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-672,SUSE-SLE-SERVER-12-SP2-2018-672
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-92_53 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-672,SUSE-SLE-SERVER-12-SP2-2018-672", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1004-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1004-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181004-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1004-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003920.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T08:21:50Z", "generator": { "date": "2018-04-20T08:21:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1004-1", "initial_release_date": "2018-04-20T08:21:50Z", "revision_history": [ { "date": "2018-04-20T08:21:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "product_id": "kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:21:50Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:21:50Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:21:50Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:21:50Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1023-1
Vulnerability from csaf_suse
Published
2018-04-20 08:21
Modified
2018-04-20 08:21
Summary
Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.74-92_32 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-670,SUSE-SLE-SERVER-12-SP2-2018-670
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_32 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-670,SUSE-SLE-SERVER-12-SP2-2018-670", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1023-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1023-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181023-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1023-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003938.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T08:21:03Z", "generator": { "date": "2018-04-20T08:21:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1023-1", "initial_release_date": "2018-04-20T08:21:03Z", "revision_history": [ { "date": "2018-04-20T08:21:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "product_id": "kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:21:03Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:21:03Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:21:03Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:21:03Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1020-1
Vulnerability from csaf_suse
Published
2018-04-20 08:25
Modified
2018-04-20 08:25
Summary
Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.82-6_9 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-683
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.82-6_9 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-683", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1020-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1020-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181020-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1020-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003935.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-04-20T08:25:12Z", "generator": { "date": "2018-04-20T08:25:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1020-1", "initial_release_date": "2018-04-20T08:25:12Z", "revision_history": [ { "date": "2018-04-20T08:25:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:12Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:12Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:12Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:12Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1027-1
Vulnerability from csaf_suse
Published
2018-04-20 08:24
Modified
2018-04-20 08:24
Summary
Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.103-6_33 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-678
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-6_33 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-678", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1027-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1027-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181027-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1027-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003942.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-04-20T08:24:25Z", "generator": { "date": "2018-04-20T08:24:25Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1027-1", "initial_release_date": "2018-04-20T08:24:25Z", "revision_history": [ { "date": "2018-04-20T08:24:25Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:25Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:25Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:25Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:25Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1005-1
Vulnerability from csaf_suse
Published
2018-04-20 08:26
Modified
2018-04-20 08:26
Summary
Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_57 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SAP-12-SP1-2018-690,SUSE-SLE-SERVER-12-SP1-2018-690
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_57 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-690,SUSE-SLE-SERVER-12-SP1-2018-690", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1005-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1005-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181005-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1005-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003921.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-04-20T08:26:19Z", "generator": { "date": "2018-04-20T08:26:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1005-1", "initial_release_date": "2018-04-20T08:26:19Z", "revision_history": [ { "date": "2018-04-20T08:26:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:19Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:19Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:19Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:19Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1022-1
Vulnerability from csaf_suse
Published
2018-04-20 08:24
Modified
2018-04-20 08:24
Summary
Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.103-6_38 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-679
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-6_38 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-679", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1022-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1022-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181022-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1022-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003937.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-04-20T08:24:35Z", "generator": { "date": "2018-04-20T08:24:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1022-1", "initial_release_date": "2018-04-20T08:24:35Z", "revision_history": [ { "date": "2018-04-20T08:24:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:35Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:35Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:35Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:35Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1032-1
Vulnerability from csaf_suse
Published
2018-04-20 08:25
Modified
2018-04-20 08:25
Summary
Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_54 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SAP-12-SP1-2018-685,SUSE-SLE-SERVER-12-SP1-2018-685
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_54 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-685,SUSE-SLE-SERVER-12-SP1-2018-685", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1032-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1032-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181032-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1032-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003947.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-04-20T08:25:32Z", "generator": { "date": "2018-04-20T08:25:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1032-1", "initial_release_date": "2018-04-20T08:25:32Z", "revision_history": [ { "date": "2018-04-20T08:25:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:32Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:32Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:32Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:32Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1025-1
Vulnerability from csaf_suse
Published
2018-04-20 08:25
Modified
2018-04-20 08:25
Summary
Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_40 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SAP-12-SP1-2018-687,SUSE-SLE-SERVER-12-SP1-2018-687
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_40 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-687,SUSE-SLE-SERVER-12-SP1-2018-687", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1025-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1025-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181025-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1025-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003940.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-04-20T08:25:52Z", "generator": { "date": "2018-04-20T08:25:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1025-1", "initial_release_date": "2018-04-20T08:25:52Z", "revision_history": [ { "date": "2018-04-20T08:25:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:52Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:52Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:52Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:25:52Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0989-1
Vulnerability from csaf_suse
Published
2018-04-20 08:23
Modified
2018-04-20 08:23
Summary
Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.90-92_45 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-674,SUSE-SLE-SERVER-12-SP2-2018-674
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.90-92_45 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-674,SUSE-SLE-SERVER-12-SP2-2018-674", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0989-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0989-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180989-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0989-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003905.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T08:23:00Z", "generator": { "date": "2018-04-20T08:23:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0989-1", "initial_release_date": "2018-04-20T08:23:00Z", "revision_history": [ { "date": "2018-04-20T08:23:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "product_id": "kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:23:00Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:23:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:23:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:23:00Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1011-1
Vulnerability from csaf_suse
Published
2018-04-20 08:23
Modified
2018-04-20 08:23
Summary
Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.90-92_50 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-675,SUSE-SLE-SERVER-12-SP2-2018-675
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.90-92_50 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-675,SUSE-SLE-SERVER-12-SP2-2018-675", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1011-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1011-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181011-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1011-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T08:23:12Z", "generator": { "date": "2018-04-20T08:23:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1011-1", "initial_release_date": "2018-04-20T08:23:12Z", "revision_history": [ { "date": "2018-04-20T08:23:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "product_id": "kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:23:12Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:23:12Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:23:12Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:23:12Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0988-1
Vulnerability from csaf_suse
Published
2018-04-20 08:26
Modified
2018-04-20 08:26
Summary
Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_69 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SAP-12-SP1-2018-694,SUSE-SLE-SERVER-12-SP1-2018-694
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_69 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-694,SUSE-SLE-SERVER-12-SP1-2018-694", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0988-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0988-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180988-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0988-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003904.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-04-20T08:26:54Z", "generator": { "date": "2018-04-20T08:26:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0988-1", "initial_release_date": "2018-04-20T08:26:54Z", "revision_history": [ { "date": "2018-04-20T08:26:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:54Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:54Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:54Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:54Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1080-1
Vulnerability from csaf_suse
Published
2018-04-25 13:27
Modified
2018-04-25 13:27
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).
Enhancements and bugfixes over the previous fixes have been added to this kernel.
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).
- CVE-2018-7566: There was a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bnc#1083483).
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).
- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allowed local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).
- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function in kernel/futex.c in the Linux kernel might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).
- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).
The following non-security bugs were fixed:
- af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085513, LTC#165135).
- cifs: fix buffer overflow in cifs_build_path_to_root() (bsc#1085113).
- drm/mgag200: fix a test in mga_vga_mode_valid() (bsc#1087092).
- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1013018).
- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1013018).
- ide-cd: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (git-fixes).
- kabi: x86/kaiser: properly align trampoline stack.
- keys: do not let add_key() update an uninstantiated key (bnc#1063416).
- keys: prevent creating a different user's keyrings (bnc#1065999).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- nfsv4: fix getacl head length estimation (git-fixes).
- pci: Use function 0 VPD for identical functions, regular VPD for others (bnc#943786 git-fixes).
- pipe: actually allow root to exceed the pipe buffer limits (git-fixes).
- posix-timers: Protect posix clock array access against speculation (bnc#1081358).
- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075088).
- qeth: repair SBAL elements calculation (bnc#1085513, LTC#165484).
- Revert 'USB: cdc-acm: fix broken runtime suspend' (bsc#1067912)
- s390/qeth: fix underestimated count of buffer elements (bnc#1082091, LTC#164529).
- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).
- usbnet: Fix a race between usbnet_stop() and the BH (bsc#1083275).
- x86-64: Move the 'user' vsyscall segment out of the data segment (bsc#1082424).
- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).
- x86/kaiser: properly align trampoline stack (bsc#1087260).
- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).
- xen/x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- xen/x86/cpu: Check speculation control CPUID bit (bsc#1068032).
- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).
- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the 'clearcpuid=' command-line option (bsc#1065600).
- xen/x86/cpu: Sync CPU feature flags late (bsc#1075994 bsc#1075091).
- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).
- xen/x86/kaiser: Move feature detection up (bsc#1068032).
- xfs: check for buffer errors before waiting (bsc#1052943).
- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
Patchnames
sdksp4-kernel-source-20180417-13574,slessp4-kernel-source-20180417-13574,slexsp3-kernel-source-20180417-13574
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032).\n\n Enhancements and bugfixes over the previous fixes have been added to this kernel.\n\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).\n- CVE-2018-7566: There was a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bnc#1083483).\n- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).\n- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allowed local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).\n- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).\n- CVE-2017-18208: The madvise_willneed function in mm/madvise.c local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).\n- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).\n- CVE-2018-6927: The futex_requeue function in kernel/futex.c in the Linux kernel might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).\n- CVE-2017-16914: The \u0027stub_send_ret_submit()\u0027 function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).\n- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).\n- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).\n- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).\n- CVE-2017-16912: The \u0027get_pipe()\u0027 function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).\n- CVE-2017-16913: The \u0027stub_recv_cmd_submit()\u0027 function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).\n\nThe following non-security bugs were fixed:\n\n- af_iucv: enable control sends in case of SEND_SHUTDOWN (bnc#1085513, LTC#165135).\n- cifs: fix buffer overflow in cifs_build_path_to_root() (bsc#1085113).\n- drm/mgag200: fix a test in mga_vga_mode_valid() (bsc#1087092).\n- hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers) (bnc#1013018).\n- hrtimer: Reset hrtimer cpu base proper on CPU hotplug (bnc#1013018).\n- ide-cd: workaround VMware ESXi cdrom emulation bug (bsc#1080813).\n- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).\n- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).\n- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).\n- jffs2: Fix use-after-free bug in jffs2_iget()\u0027s error handling path (git-fixes).\n- kabi: x86/kaiser: properly align trampoline stack.\n- keys: do not let add_key() update an uninstantiated key (bnc#1063416).\n- keys: prevent creating a different user\u0027s keyrings (bnc#1065999).\n- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).\n- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).\n- nfsv4: fix getacl head length estimation (git-fixes).\n- pci: Use function 0 VPD for identical functions, regular VPD for others (bnc#943786 git-fixes).\n- pipe: actually allow root to exceed the pipe buffer limits (git-fixes).\n- posix-timers: Protect posix clock array access against speculation (bnc#1081358).\n- powerpc/pseries: Support firmware disable of RFI flush (bsc#1068032, bsc#1075088).\n- qeth: repair SBAL elements calculation (bnc#1085513, LTC#165484).\n- Revert \u0027USB: cdc-acm: fix broken runtime suspend\u0027 (bsc#1067912)\n- s390/qeth: fix underestimated count of buffer elements (bnc#1082091, LTC#164529).\n- scsi: sr: workaround VMware ESXi cdrom emulation bug (bsc#1080813).\n- usbnet: Fix a race between usbnet_stop() and the BH (bsc#1083275).\n- x86-64: Move the \u0027user\u0027 vsyscall segment out of the data segment (bsc#1082424).\n- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).\n- x86/kaiser: properly align trampoline stack (bsc#1087260).\n- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).\n- xen/x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).\n- xen/x86/cpu: Check speculation control CPUID bit (bsc#1068032).\n- xen/x86/cpu: Factor out application of forced CPU caps (bsc#1075994 bsc#1075091).\n- xen/x86/cpu: Fix bootup crashes by sanitizing the argument of the \u0027clearcpuid=\u0027 command-line option (bsc#1065600).\n- xen/x86/cpu: Sync CPU feature flags late (bsc#1075994 bsc#1075091).\n- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- xen/x86/idle: Toggle IBRS when going idle (bsc#1068032).\n- xen/x86/kaiser: Move feature detection up (bsc#1068032).\n- xfs: check for buffer errors before waiting (bsc#1052943).\n- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-source-20180417-13574,slessp4-kernel-source-20180417-13574,slexsp3-kernel-source-20180417-13574", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1080-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1080-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181080-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1080-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" }, { "category": "self", "summary": "SUSE Bug 1010470", "url": "https://bugzilla.suse.com/1010470" }, { "category": "self", "summary": "SUSE Bug 1013018", "url": "https://bugzilla.suse.com/1013018" }, { "category": "self", "summary": "SUSE Bug 1039348", "url": "https://bugzilla.suse.com/1039348" }, { "category": "self", "summary": "SUSE Bug 1052943", "url": "https://bugzilla.suse.com/1052943" }, { "category": "self", "summary": "SUSE Bug 1062568", "url": "https://bugzilla.suse.com/1062568" }, { "category": "self", "summary": "SUSE Bug 1062840", "url": "https://bugzilla.suse.com/1062840" }, { "category": "self", "summary": "SUSE Bug 1063416", "url": "https://bugzilla.suse.com/1063416" }, { "category": "self", "summary": "SUSE Bug 1063516", "url": "https://bugzilla.suse.com/1063516" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065999", "url": "https://bugzilla.suse.com/1065999" }, { "category": "self", "summary": "SUSE Bug 1067118", "url": "https://bugzilla.suse.com/1067118" }, { "category": "self", "summary": "SUSE Bug 1067912", "url": "https://bugzilla.suse.com/1067912" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1072689", "url": "https://bugzilla.suse.com/1072689" }, { "category": "self", "summary": "SUSE Bug 1072865", "url": "https://bugzilla.suse.com/1072865" }, { "category": "self", "summary": "SUSE Bug 1075088", "url": "https://bugzilla.suse.com/1075088" }, { "category": "self", "summary": "SUSE Bug 1075091", "url": "https://bugzilla.suse.com/1075091" }, { "category": "self", "summary": "SUSE Bug 1075994", "url": "https://bugzilla.suse.com/1075994" }, { "category": "self", "summary": "SUSE Bug 1078669", "url": "https://bugzilla.suse.com/1078669" }, { "category": "self", "summary": "SUSE Bug 1078672", "url": "https://bugzilla.suse.com/1078672" }, { "category": "self", "summary": "SUSE Bug 1078673", "url": "https://bugzilla.suse.com/1078673" }, { "category": "self", "summary": "SUSE Bug 1078674", "url": "https://bugzilla.suse.com/1078674" }, { "category": "self", "summary": "SUSE Bug 1080464", "url": "https://bugzilla.suse.com/1080464" }, { "category": "self", "summary": "SUSE Bug 1080757", "url": "https://bugzilla.suse.com/1080757" }, { "category": "self", "summary": "SUSE Bug 1080813", "url": "https://bugzilla.suse.com/1080813" }, { "category": "self", "summary": "SUSE Bug 1081358", "url": "https://bugzilla.suse.com/1081358" }, { "category": "self", "summary": "SUSE Bug 1082091", "url": "https://bugzilla.suse.com/1082091" }, { "category": "self", "summary": "SUSE Bug 1082424", "url": "https://bugzilla.suse.com/1082424" }, { "category": "self", "summary": "SUSE Bug 1083242", "url": "https://bugzilla.suse.com/1083242" }, { "category": "self", "summary": "SUSE Bug 1083275", "url": "https://bugzilla.suse.com/1083275" }, { "category": "self", "summary": "SUSE Bug 1083483", "url": "https://bugzilla.suse.com/1083483" }, { "category": "self", "summary": "SUSE Bug 1083494", "url": "https://bugzilla.suse.com/1083494" }, { "category": "self", "summary": "SUSE Bug 1084536", "url": "https://bugzilla.suse.com/1084536" }, { "category": "self", "summary": "SUSE Bug 1085113", "url": "https://bugzilla.suse.com/1085113" }, { "category": "self", "summary": "SUSE Bug 1085279", "url": "https://bugzilla.suse.com/1085279" }, { "category": "self", "summary": "SUSE Bug 1085331", "url": "https://bugzilla.suse.com/1085331" }, { "category": "self", "summary": "SUSE Bug 1085513", "url": "https://bugzilla.suse.com/1085513" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1087762", "url": "https://bugzilla.suse.com/1087762" }, { "category": "self", "summary": "SUSE Bug 1088147", "url": "https://bugzilla.suse.com/1088147" }, { "category": "self", "summary": "SUSE Bug 1088260", "url": "https://bugzilla.suse.com/1088260" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 909077", "url": "https://bugzilla.suse.com/909077" }, { "category": "self", "summary": "SUSE Bug 940776", "url": "https://bugzilla.suse.com/940776" }, { "category": "self", "summary": "SUSE Bug 943786", "url": "https://bugzilla.suse.com/943786" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5156 page", "url": "https://www.suse.com/security/cve/CVE-2015-5156/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7915 page", "url": "https://www.suse.com/security/cve/CVE-2016-7915/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0861 page", "url": "https://www.suse.com/security/cve/CVE-2017-0861/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12190 page", "url": "https://www.suse.com/security/cve/CVE-2017-12190/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16644 page", "url": "https://www.suse.com/security/cve/CVE-2017-16644/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16911 page", "url": "https://www.suse.com/security/cve/CVE-2017-16911/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16912 page", "url": "https://www.suse.com/security/cve/CVE-2017-16912/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16913 page", "url": "https://www.suse.com/security/cve/CVE-2017-16913/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16914 page", "url": "https://www.suse.com/security/cve/CVE-2017-16914/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18203 page", "url": "https://www.suse.com/security/cve/CVE-2017-18203/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18208 page", "url": "https://www.suse.com/security/cve/CVE-2017-18208/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6927 page", "url": "https://www.suse.com/security/cve/CVE-2018-6927/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7757 page", "url": "https://www.suse.com/security/cve/CVE-2018-7757/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-04-25T13:27:56Z", "generator": { "date": "2018-04-25T13:27:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1080-1", "initial_release_date": "2018-04-25T13:27:56Z", "revision_history": [ { "date": "2018-04-25T13:27:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.38.1.i586", "product": { "name": "kernel-default-3.0.101-108.38.1.i586", "product_id": "kernel-default-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.38.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.38.1.i586", "product_id": "kernel-default-base-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.38.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.38.1.i586", "product_id": "kernel-default-devel-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.38.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.38.1.i586", "product_id": "kernel-ec2-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.38.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.38.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.38.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.38.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.38.1.i586", "product": { "name": "kernel-pae-3.0.101-108.38.1.i586", "product_id": "kernel-pae-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.38.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.38.1.i586", "product_id": "kernel-pae-base-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.38.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.38.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.38.1.i586", "product": { "name": "kernel-source-3.0.101-108.38.1.i586", "product_id": "kernel-source-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.38.1.i586", "product": { "name": "kernel-syms-3.0.101-108.38.1.i586", "product_id": "kernel-syms-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.38.1.i586", "product": { "name": "kernel-trace-3.0.101-108.38.1.i586", "product_id": "kernel-trace-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.38.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.38.1.i586", "product_id": "kernel-trace-base-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.38.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.38.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.38.1.i586", "product": { "name": "kernel-xen-3.0.101-108.38.1.i586", "product_id": "kernel-xen-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.38.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.38.1.i586", "product_id": "kernel-xen-base-3.0.101-108.38.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.38.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.38.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.38.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.38.1.ia64", "product": { "name": "kernel-default-3.0.101-108.38.1.ia64", "product_id": "kernel-default-3.0.101-108.38.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.38.1.ia64", "product": { "name": "kernel-default-base-3.0.101-108.38.1.ia64", "product_id": "kernel-default-base-3.0.101-108.38.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.38.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-108.38.1.ia64", "product_id": "kernel-default-devel-3.0.101-108.38.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.38.1.ia64", "product": { "name": "kernel-source-3.0.101-108.38.1.ia64", "product_id": "kernel-source-3.0.101-108.38.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.38.1.ia64", "product": { "name": "kernel-syms-3.0.101-108.38.1.ia64", "product_id": "kernel-syms-3.0.101-108.38.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.38.1.ia64", "product": { "name": "kernel-trace-3.0.101-108.38.1.ia64", "product_id": "kernel-trace-3.0.101-108.38.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.38.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-108.38.1.ia64", "product_id": "kernel-trace-base-3.0.101-108.38.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.38.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-108.38.1.ia64", "product_id": "kernel-trace-devel-3.0.101-108.38.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-108.38.1.noarch", "product": { "name": "kernel-docs-3.0.101-108.38.1.noarch", "product_id": "kernel-docs-3.0.101-108.38.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.38.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.38.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.38.1.ppc64", "product_id": "kernel-default-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.38.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.38.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.38.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.38.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.38.1.ppc64", "product_id": "kernel-source-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.38.1.ppc64", "product_id": "kernel-syms-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.38.1.ppc64", "product_id": "kernel-trace-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.38.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.38.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.38.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.38.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.38.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.38.1.s390x", "product": { "name": "kernel-default-3.0.101-108.38.1.s390x", "product_id": "kernel-default-3.0.101-108.38.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.38.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.38.1.s390x", "product_id": "kernel-default-base-3.0.101-108.38.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.38.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.38.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.38.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.38.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.38.1.s390x", "product_id": "kernel-default-man-3.0.101-108.38.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.38.1.s390x", "product": { "name": "kernel-source-3.0.101-108.38.1.s390x", "product_id": "kernel-source-3.0.101-108.38.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.38.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.38.1.s390x", "product_id": "kernel-syms-3.0.101-108.38.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.38.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.38.1.s390x", "product_id": "kernel-trace-3.0.101-108.38.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.38.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.38.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.38.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.38.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.38.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.38.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.38.1.x86_64", "product_id": "kernel-default-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.38.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.38.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.38.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.38.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.38.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.38.1.x86_64", "product_id": "kernel-source-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.38.1.x86_64", "product_id": "kernel-syms-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.38.1.x86_64", "product_id": "kernel-trace-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.38.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.38.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.38.1.x86_64", "product_id": "kernel-xen-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.38.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.38.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.38.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.38.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-108.38.1.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" }, "product_reference": "kernel-docs-3.0.101-108.38.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586" }, "product_reference": "kernel-default-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586" }, "product_reference": "kernel-source-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586" }, "product_reference": "kernel-default-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586" }, "product_reference": "kernel-source-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.38.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.38.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.38.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.38.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.38.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.38.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.38.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.38.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5156" } ], "notes": [ { "category": "general", "text": "The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5156", "url": "https://www.suse.com/security/cve/CVE-2015-5156" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1123903" }, { "category": "external", "summary": "SUSE Bug 940776 for CVE-2015-5156", "url": "https://bugzilla.suse.com/940776" }, { "category": "external", "summary": "SUSE Bug 945048 for CVE-2015-5156", "url": "https://bugzilla.suse.com/945048" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-5156", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "moderate" } ], "title": "CVE-2015-5156" }, { "cve": "CVE-2016-7915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7915" } ], "notes": [ { "category": "general", "text": "The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7915", "url": "https://www.suse.com/security/cve/CVE-2016-7915" }, { "category": "external", "summary": "SUSE Bug 1010470 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1010470" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "moderate" } ], "title": "CVE-2016-7915" }, { "cve": "CVE-2017-0861", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0861" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0861", "url": "https://www.suse.com/security/cve/CVE-2017-0861" }, { "category": "external", "summary": "SUSE Bug 1088260 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088260" }, { "category": "external", "summary": "SUSE Bug 1088268 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088268" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "moderate" } ], "title": "CVE-2017-0861" }, { "cve": "CVE-2017-12190", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12190" } ], "notes": [ { "category": "general", "text": "The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12190", "url": "https://www.suse.com/security/cve/CVE-2017-12190" }, { "category": "external", "summary": "SUSE Bug 1062568 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1062568" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "moderate" } ], "title": "CVE-2017-12190" }, { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2017-16644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16644" } ], "notes": [ { "category": "general", "text": "The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16644", "url": "https://www.suse.com/security/cve/CVE-2017-16644" }, { "category": "external", "summary": "SUSE Bug 1067118 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1067118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "moderate" } ], "title": "CVE-2017-16644" }, { "cve": "CVE-2017-16911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16911" } ], "notes": [ { "category": "general", "text": "The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16911", "url": "https://www.suse.com/security/cve/CVE-2017-16911" }, { "category": "external", "summary": "SUSE Bug 1078674 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1078674" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "low" } ], "title": "CVE-2017-16911" }, { "cve": "CVE-2017-16912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16912" } ], "notes": [ { "category": "general", "text": "The \"get_pipe()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16912", "url": "https://www.suse.com/security/cve/CVE-2017-16912" }, { "category": "external", "summary": "SUSE Bug 1078673 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1078673" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "moderate" } ], "title": "CVE-2017-16912" }, { "cve": "CVE-2017-16913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16913" } ], "notes": [ { "category": "general", "text": "The \"stub_recv_cmd_submit()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16913", "url": "https://www.suse.com/security/cve/CVE-2017-16913" }, { "category": "external", "summary": "SUSE Bug 1078672 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1078672" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "moderate" } ], "title": "CVE-2017-16913" }, { "cve": "CVE-2017-16914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16914" } ], "notes": [ { "category": "general", "text": "The \"stub_send_ret_submit()\" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16914", "url": "https://www.suse.com/security/cve/CVE-2017-16914" }, { "category": "external", "summary": "SUSE Bug 1078669 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1078669" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "low" } ], "title": "CVE-2017-16914" }, { "cve": "CVE-2017-18203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18203" } ], "notes": [ { "category": "general", "text": "The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18203", "url": "https://www.suse.com/security/cve/CVE-2017-18203" }, { "category": "external", "summary": "SUSE Bug 1083242 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1083242" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "moderate" } ], "title": "CVE-2017-18203" }, { "cve": "CVE-2017-18208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18208" } ], "notes": [ { "category": "general", "text": "The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18208", "url": "https://www.suse.com/security/cve/CVE-2017-18208" }, { "category": "external", "summary": "SUSE Bug 1083494 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1083494" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "moderate" } ], "title": "CVE-2017-18208" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-6927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6927" } ], "notes": [ { "category": "general", "text": "The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6927", "url": "https://www.suse.com/security/cve/CVE-2018-6927" }, { "category": "external", "summary": "SUSE Bug 1080757 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1080757" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "moderate" } ], "title": "CVE-2018-6927" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "important" } ], "title": "CVE-2018-7566" }, { "cve": "CVE-2018-7757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7757" } ], "notes": [ { "category": "general", "text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7757", "url": "https://www.suse.com/security/cve/CVE-2018-7757" }, { "category": "external", "summary": "SUSE Bug 1084536 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1084536" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087209 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087209" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "moderate" } ], "title": "CVE-2018-7757" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.38.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-04-25T13:27:56Z", "details": "moderate" } ], "title": "CVE-2018-8822" } ] }
suse-su-2018:1015-1
Vulnerability from csaf_suse
Published
2018-04-20 08:26
Modified
2018-04-20 08:26
Summary
Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_48 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SAP-12-SP1-2018-688,SUSE-SLE-SERVER-12-SP1-2018-688
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_48 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-688,SUSE-SLE-SERVER-12-SP1-2018-688", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1015-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1015-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181015-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1015-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003931.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-04-20T08:26:01Z", "generator": { "date": "2018-04-20T08:26:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1015-1", "initial_release_date": "2018-04-20T08:26:01Z", "revision_history": [ { "date": "2018-04-20T08:26:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:01Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:01Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:01Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:26:01Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0993-1
Vulnerability from csaf_suse
Published
2018-04-20 08:20
Modified
2018-04-20 08:20
Summary
Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.74-92_35 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-668,SUSE-SLE-SERVER-12-SP2-2018-668
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_35 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n- CVE-2018-1000004: Prevent race condition in the sound system that could have lead to a deadlock and denial of service condition (bsc#1076017).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-668,SUSE-SLE-SERVER-12-SP2-2018-668", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0993-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0993-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180993-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0993-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003909.html" }, { "category": "self", "summary": "SUSE Bug 1073230", "url": "https://bugzilla.suse.com/1073230" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T08:20:36Z", "generator": { "date": "2018-04-20T08:20:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0993-1", "initial_release_date": "2018-04-20T08:20:36Z", "revision_history": [ { "date": "2018-04-20T08:20:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "product_id": "kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:36Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:36Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:36Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:36Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0998-1
Vulnerability from csaf_suse
Published
2018-04-20 08:24
Modified
2018-04-20 08:24
Summary
Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.114-94_14 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-677
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-94_14 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-677", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0998-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0998-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180998-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0998-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003914.html" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-04-20T08:24:17Z", "generator": { "date": "2018-04-20T08:24:17Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0998-1", "initial_release_date": "2018-04-20T08:24:17Z", "revision_history": [ { "date": "2018-04-20T08:24:17Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:17Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:17Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:24:17Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0994-1
Vulnerability from csaf_suse
Published
2018-04-20 08:34
Modified
2018-04-20 08:34
Summary
Security update for the Linux Kernel (Live Patch 30 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 30 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_111 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SERVER-12-2018-709
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 30 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_111 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-709", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0994-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0994-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180994-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0994-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003910.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 30 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:34:51Z", "generator": { "date": "2018-04-20T08:34:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0994-1", "initial_release_date": "2018-04-20T08:34:51Z", "revision_history": [ { "date": "2018-04-20T08:34:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:51Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:51Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:51Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:51Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1172-1
Vulnerability from csaf_suse
Published
2018-05-08 17:33
Modified
2018-05-08 17:33
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)
- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)
- CVE-2018-10124: The kill_something_info function in kernel/signal.c might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536 1087209).
- CVE-2018-7566: A Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user was fixed (bnc#1083483).
- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).
- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).
- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).
- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).
- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).
- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).
- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).
- CVE-2018-6927: The futex_requeue function in kernel/futex.c might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).
- CVE-2017-16914: The 'stub_send_ret_submit()' function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).
- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).
- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).
- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).
- CVE-2017-16912: The 'get_pipe()' function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).
- CVE-2017-16913: The 'stub_recv_cmd_submit()' function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).
The following non-security bugs were fixed:
- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.
- KABI: x86/kaiser: properly align trampoline stack.
- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).
- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).
- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).
- kvm/x86: fix icebp instruction handling (bsc#1087088).
- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).
- x86-64: Move the 'user' vsyscall segment out of the data segment (bsc#1082424).
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- x86/kaiser: properly align trampoline stack (bsc#1087260).
- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).
- xfs: check for buffer errors before waiting (bsc#1052943).
- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).
Patchnames
sleposp3-kernel-source-20180429-13591,slessp3-kernel-source-20180429-13591,slexsp3-kernel-source-20180429-13591
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536 1087209).\n- CVE-2018-7566: A Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user was fixed (bnc#1083483).\n- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).\n- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).\n- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).\n- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).\n- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).\n- CVE-2018-6927: The futex_requeue function in kernel/futex.c might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).\n- CVE-2017-16914: The \u0027stub_send_ret_submit()\u0027 function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).\n- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).\n- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).\n- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).\n- CVE-2017-16912: The \u0027get_pipe()\u0027 function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).\n- CVE-2017-16913: The \u0027stub_recv_cmd_submit()\u0027 function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).\n\nThe following non-security bugs were fixed:\n\n- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.\n- KABI: x86/kaiser: properly align trampoline stack.\n- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).\n- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).\n- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).\n- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).\n- kvm/x86: fix icebp instruction handling (bsc#1087088).\n- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).\n- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).\n- x86-64: Move the \u0027user\u0027 vsyscall segment out of the data segment (bsc#1082424).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/kaiser: properly align trampoline stack (bsc#1087260).\n- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).\n- xfs: check for buffer errors before waiting (bsc#1052943).\n- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-kernel-source-20180429-13591,slessp3-kernel-source-20180429-13591,slexsp3-kernel-source-20180429-13591", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1172-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1172-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181172-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1172-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" }, { "category": "self", "summary": "SUSE Bug 1010470", "url": "https://bugzilla.suse.com/1010470" }, { "category": "self", "summary": "SUSE Bug 1039348", "url": "https://bugzilla.suse.com/1039348" }, { "category": "self", "summary": "SUSE Bug 1052943", "url": "https://bugzilla.suse.com/1052943" }, { "category": "self", "summary": "SUSE Bug 1062568", "url": "https://bugzilla.suse.com/1062568" }, { "category": "self", "summary": "SUSE Bug 1062840", "url": "https://bugzilla.suse.com/1062840" }, { "category": "self", "summary": "SUSE Bug 1063416", "url": "https://bugzilla.suse.com/1063416" }, { "category": "self", "summary": "SUSE Bug 1067118", "url": "https://bugzilla.suse.com/1067118" }, { "category": "self", "summary": "SUSE Bug 1072689", "url": "https://bugzilla.suse.com/1072689" }, { "category": "self", "summary": "SUSE Bug 1072865", "url": "https://bugzilla.suse.com/1072865" }, { "category": "self", "summary": "SUSE Bug 1078669", "url": "https://bugzilla.suse.com/1078669" }, { "category": "self", "summary": "SUSE Bug 1078672", "url": "https://bugzilla.suse.com/1078672" }, { "category": "self", "summary": "SUSE Bug 1078673", "url": "https://bugzilla.suse.com/1078673" }, { "category": "self", "summary": "SUSE Bug 1078674", "url": "https://bugzilla.suse.com/1078674" }, { "category": "self", "summary": "SUSE Bug 1080464", "url": "https://bugzilla.suse.com/1080464" }, { "category": "self", "summary": "SUSE Bug 1080757", "url": "https://bugzilla.suse.com/1080757" }, { "category": "self", "summary": "SUSE Bug 1082424", "url": "https://bugzilla.suse.com/1082424" }, { "category": "self", "summary": "SUSE Bug 1083242", "url": "https://bugzilla.suse.com/1083242" }, { "category": "self", "summary": "SUSE Bug 1083483", "url": "https://bugzilla.suse.com/1083483" }, { "category": "self", "summary": "SUSE Bug 1083494", "url": "https://bugzilla.suse.com/1083494" }, { "category": "self", "summary": "SUSE Bug 1084536", "url": "https://bugzilla.suse.com/1084536" }, { "category": "self", "summary": "SUSE Bug 1085331", "url": "https://bugzilla.suse.com/1085331" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1087209", "url": "https://bugzilla.suse.com/1087209" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1087762", "url": "https://bugzilla.suse.com/1087762" }, { "category": "self", "summary": "SUSE Bug 1088147", "url": "https://bugzilla.suse.com/1088147" }, { "category": "self", "summary": "SUSE Bug 1088260", "url": "https://bugzilla.suse.com/1088260" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 940776", "url": "https://bugzilla.suse.com/940776" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5156 page", "url": "https://www.suse.com/security/cve/CVE-2015-5156/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7915 page", "url": "https://www.suse.com/security/cve/CVE-2016-7915/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0861 page", "url": "https://www.suse.com/security/cve/CVE-2017-0861/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12190 page", "url": "https://www.suse.com/security/cve/CVE-2017-12190/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16644 page", "url": "https://www.suse.com/security/cve/CVE-2017-16644/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16911 page", "url": "https://www.suse.com/security/cve/CVE-2017-16911/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16912 page", "url": "https://www.suse.com/security/cve/CVE-2017-16912/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16913 page", "url": "https://www.suse.com/security/cve/CVE-2017-16913/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16914 page", "url": "https://www.suse.com/security/cve/CVE-2017-16914/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18203 page", "url": "https://www.suse.com/security/cve/CVE-2017-18203/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18208 page", "url": "https://www.suse.com/security/cve/CVE-2017-18208/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6927 page", "url": "https://www.suse.com/security/cve/CVE-2018-6927/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7757 page", "url": "https://www.suse.com/security/cve/CVE-2018-7757/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-08T17:33:21Z", "generator": { "date": "2018-05-08T17:33:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1172-1", "initial_release_date": "2018-05-08T17:33:21Z", "revision_history": [ { "date": "2018-05-08T17:33:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-default-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-pae-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-source-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-syms-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-trace-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-xen-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-default-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-source-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5156" } ], "notes": [ { "category": "general", "text": "The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5156", "url": "https://www.suse.com/security/cve/CVE-2015-5156" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1123903" }, { "category": "external", "summary": "SUSE Bug 940776 for CVE-2015-5156", "url": "https://bugzilla.suse.com/940776" }, { "category": "external", "summary": "SUSE Bug 945048 for CVE-2015-5156", "url": "https://bugzilla.suse.com/945048" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-5156", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2015-5156" }, { "cve": "CVE-2016-7915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7915" } ], "notes": [ { "category": "general", "text": "The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7915", "url": "https://www.suse.com/security/cve/CVE-2016-7915" }, { "category": "external", "summary": "SUSE Bug 1010470 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1010470" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2016-7915" }, { "cve": "CVE-2017-0861", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0861" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0861", "url": "https://www.suse.com/security/cve/CVE-2017-0861" }, { "category": "external", "summary": "SUSE Bug 1088260 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088260" }, { "category": "external", "summary": "SUSE Bug 1088268 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088268" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-0861" }, { "cve": "CVE-2017-12190", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12190" } ], "notes": [ { "category": "general", "text": "The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12190", "url": "https://www.suse.com/security/cve/CVE-2017-12190" }, { "category": "external", "summary": "SUSE Bug 1062568 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1062568" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-12190" }, { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2017-16644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16644" } ], "notes": [ { "category": "general", "text": "The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16644", "url": "https://www.suse.com/security/cve/CVE-2017-16644" }, { "category": "external", "summary": "SUSE Bug 1067118 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1067118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-16644" }, { "cve": "CVE-2017-16911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16911" } ], "notes": [ { "category": "general", "text": "The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16911", "url": "https://www.suse.com/security/cve/CVE-2017-16911" }, { "category": "external", "summary": "SUSE Bug 1078674 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1078674" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "low" } ], "title": "CVE-2017-16911" }, { "cve": "CVE-2017-16912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16912" } ], "notes": [ { "category": "general", "text": "The \"get_pipe()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16912", "url": "https://www.suse.com/security/cve/CVE-2017-16912" }, { "category": "external", "summary": "SUSE Bug 1078673 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1078673" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-16912" }, { "cve": "CVE-2017-16913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16913" } ], "notes": [ { "category": "general", "text": "The \"stub_recv_cmd_submit()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16913", "url": "https://www.suse.com/security/cve/CVE-2017-16913" }, { "category": "external", "summary": "SUSE Bug 1078672 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1078672" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-16913" }, { "cve": "CVE-2017-16914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16914" } ], "notes": [ { "category": "general", "text": "The \"stub_send_ret_submit()\" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16914", "url": "https://www.suse.com/security/cve/CVE-2017-16914" }, { "category": "external", "summary": "SUSE Bug 1078669 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1078669" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "low" } ], "title": "CVE-2017-16914" }, { "cve": "CVE-2017-18203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18203" } ], "notes": [ { "category": "general", "text": "The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18203", "url": "https://www.suse.com/security/cve/CVE-2017-18203" }, { "category": "external", "summary": "SUSE Bug 1083242 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1083242" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-18203" }, { "cve": "CVE-2017-18208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18208" } ], "notes": [ { "category": "general", "text": "The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18208", "url": "https://www.suse.com/security/cve/CVE-2017-18208" }, { "category": "external", "summary": "SUSE Bug 1083494 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1083494" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-18208" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-6927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6927" } ], "notes": [ { "category": "general", "text": "The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6927", "url": "https://www.suse.com/security/cve/CVE-2018-6927" }, { "category": "external", "summary": "SUSE Bug 1080757 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1080757" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2018-6927" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "important" } ], "title": "CVE-2018-7566" }, { "cve": "CVE-2018-7757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7757" } ], "notes": [ { "category": "general", "text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7757", "url": "https://www.suse.com/security/cve/CVE-2018-7757" }, { "category": "external", "summary": "SUSE Bug 1084536 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1084536" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087209 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087209" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2018-7757" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1030-1
Vulnerability from csaf_suse
Published
2018-04-20 08:34
Modified
2018-04-20 08:34
Summary
Security update for the Linux Kernel (Live Patch 32 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 32 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_122 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: The Linux kernel had a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
Patchnames
SUSE-SLE-SERVER-12-2018-707
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 32 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_122 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: The Linux kernel had a buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-707", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1030-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1030-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181030-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1030-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003945.html" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 32 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:34:39Z", "generator": { "date": "2018-04-20T08:34:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1030-1", "initial_release_date": "2018-04-20T08:34:39Z", "revision_history": [ { "date": "2018-04-20T08:34:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:39Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:39Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:39Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0999-1
Vulnerability from csaf_suse
Published
2018-04-20 08:34
Modified
2018-04-20 08:34
Summary
Security update for the Linux Kernel (Live Patch 22 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 22 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_77 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SERVER-12-2018-702
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 22 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_77 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-702", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0999-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0999-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180999-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0999-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003915.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 22 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:34:04Z", "generator": { "date": "2018-04-20T08:34:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0999-1", "initial_release_date": "2018-04-20T08:34:04Z", "revision_history": [ { "date": "2018-04-20T08:34:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:04Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:04Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:04Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:04Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0990-1
Vulnerability from csaf_suse
Published
2018-04-20 08:20
Modified
2018-04-20 08:20
Summary
Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.114-92_64 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).
- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-667,SUSE-SLE-SERVER-12-SP2-2018-667
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-92_64 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: Prevent elevation of privilege vulnerability in the v4l2 video driver (bsc#1085447).\n- CVE-2018-1068: A flaw in the implementation of 32-bit syscall interface for bridging allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-7566: Prevent buffer overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user (bsc#1083488).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-667,SUSE-SLE-SERVER-12-SP2-2018-667", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0990-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0990-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180990-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0990-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003906.html" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-04-20T08:20:19Z", "generator": { "date": "2018-04-20T08:20:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0990-1", "initial_release_date": "2018-04-20T08:20:19Z", "revision_history": [ { "date": "2018-04-20T08:20:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "product_id": "kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:19Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:19Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:20:19Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:0995-1
Vulnerability from csaf_suse
Published
2018-04-20 08:27
Modified
2018-04-20 08:27
Summary
Security update for the Linux Kernel (Live Patch 28 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 28 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_101 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SERVER-12-2018-698
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 28 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_101 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-698", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0995-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0995-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180995-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0995-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003911.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 28 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:27:26Z", "generator": { "date": "2018-04-20T08:27:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0995-1", "initial_release_date": "2018-04-20T08:27:26Z", "revision_history": [ { "date": "2018-04-20T08:27:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:27:26Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:27:26Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:27:26Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:27:26Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1001-1
Vulnerability from csaf_suse
Published
2018-04-20 08:34
Modified
2018-04-20 08:34
Summary
Security update for the Linux Kernel (Live Patch 27 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 27 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_92 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SERVER-12-2018-705
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 27 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_92 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-705", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1001-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1001-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181001-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1001-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003917.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 27 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:34:26Z", "generator": { "date": "2018-04-20T08:34:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1001-1", "initial_release_date": "2018-04-20T08:34:26Z", "revision_history": [ { "date": "2018-04-20T08:34:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:26Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:26Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:26Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:26Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
suse-su-2018:1009-1
Vulnerability from csaf_suse
Published
2018-04-20 08:34
Modified
2018-04-20 08:34
Summary
Security update for the Linux Kernel (Live Patch 25 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 25 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_86 fixes several issues.
The following security issues were fixed:
- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).
- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).
- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)
Patchnames
SUSE-SLE-SERVER-12-2018-703
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 25 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_86 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability was fixed in the kernel v4l2 video driver. (bsc#1085447).\n- CVE-2018-1068: A flaw was found in the Linux kernels implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bsc#1085114).\n- CVE-2018-1000004: A race condition vulnerability existed in the sound system, which could lead to a deadlock and denial of service condition (bsc#1076017)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-703", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1009-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1009-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181009-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1009-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" }, { "category": "self", "summary": "SUSE Bug 1076017", "url": "https://bugzilla.suse.com/1076017" }, { "category": "self", "summary": "SUSE Bug 1083488", "url": "https://bugzilla.suse.com/1083488" }, { "category": "self", "summary": "SUSE Bug 1085114", "url": "https://bugzilla.suse.com/1085114" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" } ], "title": "Security update for the Linux Kernel (Live Patch 25 for SLE 12)", "tracking": { "current_release_date": "2018-04-20T08:34:09Z", "generator": { "date": "2018-04-20T08:34:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1009-1", "initial_release_date": "2018-04-20T08:34:09Z", "revision_history": [ { "date": "2018-04-20T08:34:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:09Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:09Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:09Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-04-20T08:34:09Z", "details": "important" } ], "title": "CVE-2018-7566" } ] }
rhsa-2018:2948
Vulnerability from csaf_redhat
Published
2018-10-30 12:05
Modified
2025-08-04 12:06
Summary
Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update
Notes
Topic
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, aarch64)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
Space precludes documenting all of the security fixes in this advisory. See the descriptions of the remaining security fixes in the related Knowledge Article:
https://access.redhat.com/articles/3658021
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391; Qualys Research Labs for reporting CVE-2018-1120; David Rientjes (Google) for reporting CVE-2018-1000200; and Wen Xu for reporting CVE-2018-1092, CVE-2018-1094, and CVE-2018-1095. The CVE-2018-14619 issue was discovered by Florian Weimer (Red Hat) and Ondrej Mosnacek (Red Hat).
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, aarch64)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\nSpace precludes documenting all of the security fixes in this advisory. See the descriptions of the remaining security fixes in the related Knowledge Article: \n\nhttps://access.redhat.com/articles/3658021\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391; Qualys Research Labs for reporting CVE-2018-1120; David Rientjes (Google) for reporting CVE-2018-1000200; and Wen Xu for reporting CVE-2018-1092, CVE-2018-1094, and CVE-2018-1095. The CVE-2018-14619 issue was discovered by Florian Weimer (Red Hat) and Ondrej Mosnacek (Red Hat).\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2948", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index" }, { "category": "external", "summary": "https://access.redhat.com/articles/3658021", "url": "https://access.redhat.com/articles/3658021" }, { "category": "external", "summary": "1516257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516257" }, { "category": "external", "summary": "1528312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528312" }, { "category": "external", "summary": "1528323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528323" }, { "category": "external", "summary": "1533909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533909" }, { "category": "external", "summary": "1539508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539508" }, { "category": "external", "summary": "1539706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539706" }, { "category": "external", "summary": "1541846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541846" }, { "category": "external", "summary": "1547824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547824" }, { "category": "external", "summary": "1548412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1551051", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551051" }, { "category": "external", "summary": "1551565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551565" }, { "category": "external", "summary": "1552048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "category": "external", "summary": "1553361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553361" }, { "category": "external", "summary": "1560777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560777" }, { "category": "external", "summary": "1560788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560788" }, { "category": "external", "summary": "1560793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560793" }, { "category": "external", "summary": "1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "1568744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568744" }, { "category": "external", "summary": "1571062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571062" }, { "category": "external", "summary": "1571623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571623" }, { "category": "external", "summary": "1573699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573699" }, { "category": "external", "summary": "1575472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575472" }, { "category": "external", "summary": "1577408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577408" }, { "category": "external", "summary": "1583210", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583210" }, { "category": "external", "summary": "1589324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589324" }, { "category": "external", "summary": "1590215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590215" }, { "category": "external", "summary": "1590799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590799" }, { "category": "external", "summary": "1596795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596795" }, { "category": "external", "summary": "1596802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596802" }, { "category": "external", "summary": "1596806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596806" }, { "category": "external", "summary": "1596812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596812" }, { "category": "external", "summary": "1596828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596828" }, { "category": "external", "summary": "1596842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596842" }, { "category": "external", "summary": "1596846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596846" }, { "category": "external", "summary": "1599161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599161" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "1610958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958" }, { "category": "external", "summary": "1622004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622004" }, { "category": "external", "summary": "1623067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623067" }, { "category": "external", "summary": "1629636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629636" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2948.json" } ], "title": "Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T12:06:47+00:00", "generator": { "date": "2025-08-04T12:06:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2948", "initial_release_date": "2018-10-30T12:05:20+00:00", "revision_history": [ { "date": "2018-10-30T12:05:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-10-30T12:05:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:06:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "product": { "name": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_id": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "product": { "name": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_id": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-debug-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-debug-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.14.0-115.el7a.ppc64le", "product": { "name": "perf-0:4.14.0-115.el7a.ppc64le", "product_id": "perf-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-devel-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-devel-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-tools-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-tools-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:4.14.0-115.el7a.ppc64le", "product": { "name": "python-perf-0:4.14.0-115.el7a.ppc64le", "product_id": "python-perf-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.14.0-115.el7a.ppc64le", "product": { "name": "kernel-headers-0:4.14.0-115.el7a.ppc64le", "product_id": "kernel-headers-0:4.14.0-115.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.14.0-115.el7a?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "product": { "name": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "product_id": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.el7a?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.14.0-115.el7a.noarch", "product": { "name": "kernel-doc-0:4.14.0-115.el7a.noarch", "product_id": "kernel-doc-0:4.14.0-115.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.14.0-115.el7a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-alt-0:4.14.0-115.el7a.src", "product": { "name": "kernel-alt-0:4.14.0-115.el7a.src", "product_id": "kernel-alt-0:4.14.0-115.el7a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.el7a?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.el7a.src", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.el7a.src", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1548412" } ], "notes": [ { "category": "description", "text": "A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "RHBZ#1548412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-13166", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13166" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166" } ], "release_date": "2017-07-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "category": "workaround", "details": "A systemtap script intercepting v4l2_compat_ioctl32() function of the [videodev] module and making it to return -ENOIOCTLCMD error value would work just fine, except breaking all 32bit video capturing software, but not 64bit ones.\n\nAlternatively, blacklisting [videodev] module will work too, but it will break all video capturing software.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation" }, { "cve": "CVE-2017-16648", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1516257" } ], "notes": [ { "category": "description", "text": "The dvb frontend management subsystem in the Linux kernel contains a use-after-free which can allow a malicious user to write to memory that may be assigned to another kernel structure. This could create memory corruption, panic, or possibly other side affects.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in drivers/media/dvb-core/dvb_frontend.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and real-time kernels.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux kernel-alt package.\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "RHBZ#1516257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516257" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16648", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16648" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16648", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16648" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in drivers/media/dvb-core/dvb_frontend.c" }, { "cve": "CVE-2017-17805", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1528312" } ], "notes": [ { "category": "description", "text": "The Salsa20 encryption algorithm in the Linux kernel, before 4.14.8, does not correctly handle zero-length inputs. This allows a local attacker the ability to use the AF_ALG-based skcipher interface to cause a denial of service (uninitialized-memory free and kernel crash) or have an unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 are vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-17805" }, { "category": "external", "summary": "RHBZ#1528312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528312" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-17805", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17805" } ], "release_date": "2017-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service" }, { "cve": "CVE-2017-17806", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "discovery_date": "2017-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1528323" } ], "notes": [ { "category": "description", "text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel, before 4.14.8, does not validate that the underlying cryptographic hash algorithm is unkeyed. This allows a local attacker, able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3), to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: HMAC implementation does not validate that the underlying cryptographic hash algorithm is unkeyed allowing local attackers to cause denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and 7, its real-time kernel and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-17806" }, { "category": "external", "summary": "RHBZ#1528323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528323" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-17806", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17806" } ], "release_date": "2017-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: HMAC implementation does not validate that the underlying cryptographic hash algorithm is unkeyed allowing local attackers to cause denial-of-service" }, { "cve": "CVE-2017-18075", "cwe": { "id": "CWE-628", "name": "Function Call with Incorrectly Specified Arguments" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1539508" } ], "notes": [ { "category": "description", "text": "crypto/pcrypt.c in the Linux kernel, before 4.14.13, mishandles freeing instances, allowing a local user able to access the AF_ALG-based AEAD interface (CONFIG_CRYPTO_USER_API_AEAD) and pcrypt (CONFIG_CRYPTO_PCRYPT) to cause a denial of service (kfree of an incorrect pointer) or possibly have unspecified other impact by executing a crafted sequence of system calls. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Mishandled freeing of instances in pcrypt.c can allow a local user to cause a denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and 7, its real-time kernel and Red Hat Enterprise MRG 2, as the code with the flaw is not enabled and is not built in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18075" }, { "category": "external", "summary": "RHBZ#1539508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18075", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18075" } ], "release_date": "2017-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Mishandled freeing of instances in pcrypt.c can allow a local user to cause a denial of service" }, { "cve": "CVE-2017-18208", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2018-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1551565" } ], "notes": [ { "category": "description", "text": "The madvise_willneed function in the Linux kernel allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18208" }, { "category": "external", "summary": "RHBZ#1551565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18208", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18208" }, { "category": "external", "summary": "https://lwn.net/Articles/618064/", "url": "https://lwn.net/Articles/618064/" }, { "category": "external", "summary": "https://www.kernel.org/doc/Documentation/filesystems/dax.txt", "url": "https://www.kernel.org/doc/Documentation/filesystems/dax.txt" } ], "release_date": "2017-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service" }, { "cve": "CVE-2017-18344", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1610958" } ], "notes": [ { "category": "description", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "RHBZ#1610958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18344", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344" } ], "release_date": "2017-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "category": "workaround", "details": "Attached to this bugzilla is a systemtap script that will prevent opening (and therefore reading) the /proc/\u003cprocess\u003e/timers file which is used to leak information.\n\nThe SystemTap script is relatively small and efficient, broken into 3 distinct sections as follows:\n\n--------\n\nprobe kernel.function(\"proc_timers_open@fs/proc/base.c\").return { \n // this is -EACCES\n\t$return = -13;\n message = sprintf(\"CVE-2017-18344 mitigation denied access to %s to %s(%d)\", file_name , execname(), pid());\n // print a warning message at KERN_INFO debug level\n printk(6, message);\n}\n\nprobe begin {\n printk(6, \"Mitigation for CVE-2017-18344 loaded.\\n\");\n}\n\n\nprobe end {\n printk(6, \"Mitigation for CVE-2017-18344 unloaded.\\n\");\n}\n\n\n---------\n\nFirst, the script places a probe at the return of the kernel function \u201cproc_timers_open\u201d when called. This modifies the return value to be EACCES which would return this value to userspace preventing this file from being opened. When the /proc/\u003cpid\u003e/timer file is attempted to be opened, a message will be logged to the kernel log subsystem showing the process and pid of the application attempting to access the timer file. \n\nThis file is not in widespread use at this time, although some applications may read from it to debug or understand their own timers that are set. This mitigation will not be useful in this context.\n\nFinally, the \u201cprobe begin\u201d and \u201cprobe end\u201d code blocks tell systemtap to add the supplied text to the kernel log buffer via the printk function. This creates an audit trail by registering in the system logs exactly when the mitigation is loaded and unloaded. This will need to be compiled with guru mode (-g parameter) to compile.\n\nThis will need to be loaded at each boot to remain effective. Red Hat Product security recommends updating to a patched kernel when it is available.\n\nRed Hat always seeks to provide both mitigations to disable attacks as well as the actual patches to treat the flaw. To learn more about SystemTap, and how it can be used in your management of your Red Hat systems, please refer to Using SystemTap[1] or one of our videos about it within our Customer Portal[2].\n\n1 - https://access.redhat.com/articles/17839\n2 - https://access.redhat.com/search/#/?q=systemtap", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c" }, { "cve": "CVE-2018-1065", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1547824" } ], "notes": [ { "category": "description", "text": "A flaw was found in the netfilter/iptables subsystem. A user with the netfilter modification capabilities could insert a rule which could panic the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: xtables NULL pointer dereference in ip6_tables.c:ip6t_do_table() leading to a crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1065" }, { "category": "external", "summary": "RHBZ#1547824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547824" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1065", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1065" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1065", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1065" } ], "release_date": "2018-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: xtables NULL pointer dereference in ip6_tables.c:ip6t_do_table() leading to a crash" }, { "cve": "CVE-2018-1068", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2018-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1552048" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "RHBZ#1552048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1068", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068" } ], "release_date": "2018-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c" }, { "acknowledgments": [ { "names": [ "Wen Xu" ] } ], "cve": "CVE-2018-1092", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1560777" } ], "notes": [ { "category": "description", "text": "The Linux kernel is vulnerable to a NULL pointer dereference in the ext4/mballoc.c:ext4_process_freed_data() function. An attacker could trick a legitimate user or a privileged attacker could exploit this by mounting a crafted ext4 image to cause a kernel panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1092" }, { "category": "external", "summary": "RHBZ#1560777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1092", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1092" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1092", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1092" } ], "release_date": "2018-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image" }, { "acknowledgments": [ { "names": [ "Wen Xu" ] } ], "cve": "CVE-2018-1094", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1560788" } ], "notes": [ { "category": "description", "text": "The Linux kernel is vulnerable to a NULL pointer dereference in the ext4/xattr.c:ext4_xattr_inode_hash() function. An attacker could trick a legitimate user or a privileged attacker could exploit this to cause a NULL pointer dereference with a crafted ext4 image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1094" }, { "category": "external", "summary": "RHBZ#1560788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1094", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1094" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1094", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1094" } ], "release_date": "2018-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image" }, { "acknowledgments": [ { "names": [ "Wen Xu" ] } ], "cve": "CVE-2018-1095", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1560793" } ], "notes": [ { "category": "description", "text": "The Linux kernel is vulnerable to an out-of-bound access bug in the fs/posix_acl.c:get_acl() function. An attacker could trick a legitimate user or a privileged attacker could exploit this to cause a system crash or other unspecified impact with a crafted ext4 image. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bound access in fs/posix_acl.c:get_acl() causes crash with crafted ext4 image", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1095" }, { "category": "external", "summary": "RHBZ#1560793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1095", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1095" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1095", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1095" } ], "release_date": "2018-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: out-of-bound access in fs/posix_acl.c:get_acl() causes crash with crafted ext4 image" }, { "cve": "CVE-2018-1118", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-05-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1573699" } ], "notes": [ { "category": "description", "text": "The Linux kernel does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "RHBZ#1573699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573699" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1118", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1118" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1118", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1118" } ], "release_date": "2018-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg()" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2018-1120", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2018-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575472" } ], "notes": [ { "category": "description", "text": "By mmap()ing a FUSE-backed file onto a process\u0027s memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1120" }, { "category": "external", "summary": "RHBZ#1575472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575472" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1120", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1120" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1120", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1120" }, { "category": "external", "summary": "http://seclists.org/oss-sec/2018/q2/122", "url": "http://seclists.org/oss-sec/2018/q2/122" } ], "release_date": "2018-05-17T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" }, { "names": [ "Ken Johnson" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2018-3639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566890" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative store bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "RHBZ#1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf", "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf", "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" } ], "release_date": "2018-05-21T21:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative store bypass" }, { "cve": "CVE-2018-5344", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1533909" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s handling of loopback devices. An attacker, who has permissions to setup loopback disks, may create a denial of service or other unspecified actions.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2.\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5344" }, { "category": "external", "summary": "RHBZ#1533909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5344", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5344" } ], "release_date": "2018-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5391", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1609664" } ], "notes": [ { "category": "description", "text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "RHBZ#1609664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5391" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/641765", "url": "https://www.kb.cert.org/vuls/id/641765" } ], "release_date": "2018-08-14T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "category": "workaround", "details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)" }, { "cve": "CVE-2018-5750", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1539706" } ], "notes": [ { "category": "description", "text": "The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel, through 4.14.15, allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2, as KASLR feature is not present or enabled in these products.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5750" }, { "category": "external", "summary": "RHBZ#1539706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5750", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5750" } ], "release_date": "2017-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass" }, { "cve": "CVE-2018-5803", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1551051" } ], "notes": [ { "category": "description", "text": "An error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP, packet length can be exploited by a malicious local user to cause a kernel crash and a DoS.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "RHBZ#1551051", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5803", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5803" } ], "release_date": "2018-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service" }, { "cve": "CVE-2018-5848", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2018-05-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1590799" } ], "notes": [ { "category": "description", "text": "In the function wmi_set_ie() in the Linux kernel the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u2018ie_len\u2019 argument can cause a buffer overflow and thus a memory corruption leading to a system crash or other or unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5848" }, { "category": "external", "summary": "RHBZ#1590799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5848", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5848" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5848", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5848" } ], "release_date": "2017-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption" }, { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "cve": "CVE-2018-7757", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1553361" } ], "notes": [ { "category": "description", "text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel allows local users to cause a denial of service (kernel memory exhaustion) via multiple read accesses to files in the /sys/class/sas_phy directory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7757" }, { "category": "external", "summary": "RHBZ#1553361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7757", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7757" } ], "release_date": "2018-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c" }, { "cve": "CVE-2018-8781", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1571062" } ], "notes": [ { "category": "description", "text": "A an integer overflow vulnerability was discovered in the Linux kernel, from version 3.4 through 4.15, in the drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() function. An attacker with access to the udldrmfb driver could exploit this to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "RHBZ#1571062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571062" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8781", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8781" } ], "release_date": "2018-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space" }, { "cve": "CVE-2018-9363", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2018-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1623067" } ], "notes": [ { "category": "description", "text": "A buffer overflow due to a singed-unsigned comparsion was found in hidp_process_report() in the net/bluetooth/hidp/core.c in the Linux kernel. The buffer length is an unsigned int but gets cast to a signed int which in certain conditions can lead to a system panic and a denial-of-service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Buffer overflow in hidp_process_report", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-9363" }, { "category": "external", "summary": "RHBZ#1623067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-9363", "url": "https://www.cve.org/CVERecord?id=CVE-2018-9363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-9363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-9363" } ], "release_date": "2018-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Buffer overflow in hidp_process_report" }, { "cve": "CVE-2018-10322", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1571623" } ], "notes": [ { "category": "description", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel can cause a NULL pointer dereference in xfs_ilock_attr_map_shared function. An attacker could trick a legitimate user or a privileged attacker could exploit this by mounting a crafted xfs filesystem image to cause a kernel panic and thus a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "RHBZ#1571623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10322", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10322" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10322", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10322" } ], "release_date": "2018-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service" }, { "cve": "CVE-2018-10877", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596795" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel ext4 filesystem. An out-of-bound access is possible in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bound access in ext4_ext_drop_refs function with a crafted ext4 image", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10877" }, { "category": "external", "summary": "RHBZ#1596795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596795" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10877", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10877" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10877", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10877" } ], "release_date": "2018-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: out-of-bound access in ext4_ext_drop_refs function with a crafted ext4 image" }, { "cve": "CVE-2018-10878", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596802" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10878" }, { "category": "external", "summary": "RHBZ#1596802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596802" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10878", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10878" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10878", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10878" } ], "release_date": "2018-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image" }, { "cve": "CVE-2018-10879", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596806" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10879" }, { "category": "external", "summary": "RHBZ#1596806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10879", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10879" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10879", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10879" } ], "release_date": "2018-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file" }, { "cve": "CVE-2018-10880", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596812" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem code. A stack-out-of-bounds write in ext4_update_inline_data() is possible when mounting and writing to a crafted ext4 image. An attacker could use this to cause a system crash and a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: stack-out-of-bounds write in ext4_update_inline_data function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10880" }, { "category": "external", "summary": "RHBZ#1596812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596812" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10880", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10880" } ], "release_date": "2018-06-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: stack-out-of-bounds write in ext4_update_inline_data function" }, { "cve": "CVE-2018-10881", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596828" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10881" }, { "category": "external", "summary": "RHBZ#1596828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596828" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10881", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10881" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10881", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10881" } ], "release_date": "2018-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image" }, { "cve": "CVE-2018-10882", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596842" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in the fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: stack-out-of-bounds write infs/jbd2/transaction.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10882" }, { "category": "external", "summary": "RHBZ#1596842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10882", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10882" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10882", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10882" } ], "release_date": "2018-06-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: stack-out-of-bounds write infs/jbd2/transaction.c" }, { "cve": "CVE-2018-10883", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1596846" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10883" }, { "category": "external", "summary": "RHBZ#1596846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10883", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10883" } ], "release_date": "2018-06-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function" }, { "cve": "CVE-2018-10940", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2018-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1577408" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, before 4.16.6 where the cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10940" }, { "category": "external", "summary": "RHBZ#1577408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577408" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10940", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10940" } ], "release_date": "2018-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c" }, { "cve": "CVE-2018-11506", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2018-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1583210" } ], "notes": [ { "category": "description", "text": "The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel allows local users to cause a denial of service via a stack-based buffer overflow or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Stack-based buffer overflow in drivers/scsi/sr_ioctl.c allows denial of service or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11506" }, { "category": "external", "summary": "RHBZ#1583210", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583210" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11506", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11506" } ], "release_date": "2018-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Stack-based buffer overflow in drivers/scsi/sr_ioctl.c allows denial of service or other unspecified impact" }, { "cve": "CVE-2018-12232", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1590215" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference issue was found in the Linux kernel. If the close() and fchownat() system calls share a socket file descriptor as an argument, then the two calls can race and trigger a NULL pointer dereference leading to a system crash and a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference if close and fchownat system calls share a socket file descriptor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "RHBZ#1590215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12232", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12232" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12232", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12232" } ], "release_date": "2018-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference if close and fchownat system calls share a socket file descriptor" }, { "cve": "CVE-2018-13405", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2018-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1599161" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-13405" }, { "category": "external", "summary": "RHBZ#1599161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-13405", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13405" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-13405", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13405" } ], "release_date": "2018-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members" }, { "acknowledgments": [ { "names": [ "Florian Weimer", "Ondrej Mosnacek" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-14619", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-08-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1622004" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto subsystem that allowed an attacker \r\nto crash the system or possibly escalate privileges with a specially crafted program.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: crash (possible privesc) in kernel crypto api.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14619" }, { "category": "external", "summary": "RHBZ#1622004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14619", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14619" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b32a7dc8aef1882fbf983eb354837488cc9d54dc", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b32a7dc8aef1882fbf983eb354837488cc9d54dc" } ], "release_date": "2018-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: crash (possible privesc) in kernel crypto api." }, { "cve": "CVE-2018-14641", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2018-09-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1629636" } ], "notes": [ { "category": "description", "text": "A security flaw was found in the ip_frag_reasm() function in net/ipv4/ip_fragment.c in the Linux kernel which can cause a later system crash in ip_do_fragment(). With certain non-default, but non-rare, configuration of a victim host, an attacker can trigger this crash remotely, thus leading to a remote denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14641" }, { "category": "external", "summary": "RHBZ#1629636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629636" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14641", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14641" } ], "release_date": "2018-09-18T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment()" }, { "cve": "CVE-2018-1000026", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1541846" } ], "notes": [ { "category": "description", "text": "Improper validation in the bnx2x network card driver of the Linux kernel version 4.15 can allow for denial of service (DoS) attacks via a packet with a gso_size larger than ~9700 bytes. Untrusted guest VMs can exploit this vulnerability in the host machine, causing a crash in the network card.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, as supported configurations are not affected.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000026" }, { "category": "external", "summary": "RHBZ#1541846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000026", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000026" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000026", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000026" } ], "release_date": "2018-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet" }, { "acknowledgments": [ { "names": [ "David Rientjes" ], "organization": "Google" } ], "cve": "CVE-2018-1000200", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568744" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel where an out of memory (oom) killing of a process that has large spans of mlocked memory can result in deferencing a NULL pointer, leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference on OOM kill of large mlocked process", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000200" }, { "category": "external", "summary": "RHBZ#1568744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000200", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000200" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000200", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000200" } ], "release_date": "2018-04-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference on OOM kill of large mlocked process" }, { "cve": "CVE-2018-1000204", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1589324" } ], "notes": [ { "category": "description", "text": "A malformed SG_IO ioctl issued for a SCSI device in the Linux kernel leads to a local kernel data leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Infoleak caused by incorrect handling of the SG_IO ioctl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "RHBZ#1589324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000204", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000204" } ], "release_date": "2018-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T12:05:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Infoleak caused by incorrect handling of the SG_IO ioctl" } ] }
rhsa-2018:2390
Vulnerability from csaf_redhat
Published
2018-08-14 18:31
Modified
2025-08-03 22:19
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[Updated 16th August 2018]
The original errata text was missing reference to CVE-2018-5390 fix. We have updated the errata text to correct this issue. No changes have been made to the packages.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)
* kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861)
* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265)
* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)
* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390; and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.
Bug Fix(es):
* The Least recently used (LRU) operations are batched by caching pages in per-cpu page vectors to prevent contention of the heavily used lru_lock spinlock. The page vectors can hold even the compound pages. Previously, the page vectors were cleared only if they were full. Subsequently, the amount of memory held in page vectors, which is not reclaimable, was sometimes too high. Consequently the page reclamation started the Out of Memory (OOM) killing processes. With this update, the underlying source code has been fixed to clear LRU page vectors each time when a compound page is added to them. As a result, OOM killing processes due to high amounts of memory held in page vectors no longer occur. (BZ#1575819)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 16th August 2018]\nThe original errata text was missing reference to CVE-2018-5390 fix. We have updated the errata text to correct this issue. No changes have been made to the packages.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\n* kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861)\n\n* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390; and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.\n\nBug Fix(es):\n\n* The Least recently used (LRU) operations are batched by caching pages in per-cpu page vectors to prevent contention of the heavily used lru_lock spinlock. The page vectors can hold even the compound pages. Previously, the page vectors were cleared only if they were full. Subsequently, the amount of memory held in page vectors, which is not reclaimable, was sometimes too high. Consequently the page reclamation started the Out of Memory (OOM) killing processes. With this update, the underlying source code has been fixed to clear LRU page vectors each time when a compound page is added to them. As a result, OOM killing processes due to high amounts of memory held in page vectors no longer occur. (BZ#1575819)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2390", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1501878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878" }, { "category": "external", "summary": "1535315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1563994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563994" }, { "category": "external", "summary": "1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2390.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-03T22:19:17+00:00", "generator": { "date": "2025-08-03T22:19:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2390", "initial_release_date": "2018-08-14T18:31:23+00:00", "revision_history": [ { "date": "2018-08-14T18:31:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-16T09:52:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T22:19:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64", "product_id": "perf-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "product_id": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.3.5.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.3.5.el6.i686", "product": { "name": "perf-0:2.6.32-754.3.5.el6.i686", "product_id": "perf-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.3.5.el6.i686", "product": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686", "product_id": "python-perf-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.3.5.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.3.5.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "product_id": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.3.5.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.3.5.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.src", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.src", "product_id": "kernel-0:2.6.32-754.3.5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x", "product_id": "python-perf-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "perf-0:2.6.32-754.3.5.el6.s390x", "product_id": "perf-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.3.5.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "product_id": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64", "product_id": "perf-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.3.5.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-0861", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1563994" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the snd_pcm_info() function in the ALSA subsystem in the Linux kernel allows attackers to induce a kernel memory corruption and possibly crash or lock up a system. Due to the nature of the flaw, a privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-0861" }, { "category": "external", "summary": "RHBZ#1563994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-0861", "url": "https://www.cve.org/CVERecord?id=CVE-2017-0861" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-0861", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0861" } ], "release_date": "2017-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation" }, { "cve": "CVE-2017-15265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1501878" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found when issuing an ioctl to a sound device. This could allow a user to exploit a race condition and create memory corruption or possibly privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in snd_seq_ioctl_create_port()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5,6, 7, realtime and MRG-2.\n\nRed Hat Enterprise Linux 5 has transitioned to Production phase 3. \nDuring the Production 3 Phase, Critical impact Security Advisories (RHSAs) \nand selected Urgent Priority Bug Fix Advisories (RHBAs) may be released \nas they become available.\n\nThe official life cycle policy can be reviewed here:\n\nhttp://redhat.com/rhel/lifecycle\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "RHBZ#1501878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15265", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15265" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265" } ], "release_date": "2017-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "category": "workaround", "details": "It is possible to prevent the affected code from being loaded by blacklisting the kernel module snd_seq. Instructions relating to how to blacklist a kernel module are shown here: https://access.redhat.com/solutions/41278 \n\nAlternatively a custom permission set can be created by udev, the correct permissions will depend on your use case. Please contact Red Hat customer support for creating a rule set that can minimize flaw exposure.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in snd_seq_ioctl_create_port()" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Carl Waldspurger" ], "organization": "Carl Waldspurger Consulting" }, { "names": [ "Vladimir Kiriansky" ], "organization": "MIT" } ], "cve": "CVE-2018-3693", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1581650" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: speculative bounds check bypass store", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3693" }, { "category": "external", "summary": "RHBZ#1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3693", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693" }, { "category": "external", "summary": "https://01.org/security/advisories/intel-oss-10002", "url": "https://01.org/security/advisories/intel-oss-10002" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3523601", "url": "https://access.redhat.com/solutions/3523601" }, { "category": "external", "summary": "https://people.csail.mit.edu/vlk/spectre11.pdf", "url": "https://people.csail.mit.edu/vlk/spectre11.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf", "url": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf" } ], "release_date": "2018-07-10T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: speculative bounds check bypass store" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "acknowledgments": [ { "names": [ "Vegard Nossum" ], "organization": "Oracle Corporation" } ], "cve": "CVE-2018-10901", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601849" } ], "notes": [ { "category": "description", "text": "A flaw was found in Linux kernel\u0027s KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host\u0027s userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: vmx: host GDT limit corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10901" }, { "category": "external", "summary": "RHBZ#1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10901", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10901" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901" } ], "release_date": "2010-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: kvm: vmx: host GDT limit corruption" }, { "cve": "CVE-2018-1000004", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1535315" } ], "notes": [ { "category": "description", "text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in sound system can lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "RHBZ#1535315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004" } ], "release_date": "2018-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in sound system can lead to denial of service" } ] }
rhsa-2018:2384
Vulnerability from csaf_redhat
Published
2018-08-14 18:49
Modified
2025-08-03 19:14
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.
Bug Fix(es):
These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:
https://access.redhat.com/articles/3527791
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:\n\nhttps://access.redhat.com/articles/3527791", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2384", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://access.redhat.com/articles/3527791", "url": "https://access.redhat.com/articles/3527791" }, { "category": "external", "summary": "1535173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2384.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-03T19:14:27+00:00", "generator": { "date": "2025-08-03T19:14:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2384", "initial_release_date": "2018-08-14T18:49:36+00:00", "revision_history": [ { "date": "2018-08-14T18:49:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T18:49:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T19:14:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "product_id": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64", "product_id": "perf-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.11.6.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.src", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.src", "product_id": "kernel-0:3.10.0-862.11.6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.11.6.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "product_id": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.11.6.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64", "product_id": "perf-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "product_id": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.11.6.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "perf-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.11.6.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "perf-0:3.10.0-862.11.6.el7.s390x", "product_id": "perf-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x", "product_id": "python-perf-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13215", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1535173" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s skcipher component, which affects the skcipher_recvmsg function. Attackers using a specific input can lead to a privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: crypto: privilege escalation in skcipher_recvmsg function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, and kernel-alt packages.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, MRG-2 and real-time kernels.\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-13215" }, { "category": "external", "summary": "RHBZ#1535173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-13215", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13215" } ], "release_date": "2018-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: crypto: privilege escalation in skcipher_recvmsg function" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Carl Waldspurger" ], "organization": "Carl Waldspurger Consulting" }, { "names": [ "Vladimir Kiriansky" ], "organization": "MIT" } ], "cve": "CVE-2018-3693", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1581650" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: speculative bounds check bypass store", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3693" }, { "category": "external", "summary": "RHBZ#1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3693", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693" }, { "category": "external", "summary": "https://01.org/security/advisories/intel-oss-10002", "url": "https://01.org/security/advisories/intel-oss-10002" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3523601", "url": "https://access.redhat.com/solutions/3523601" }, { "category": "external", "summary": "https://people.csail.mit.edu/vlk/spectre11.pdf", "url": "https://people.csail.mit.edu/vlk/spectre11.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf", "url": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf" } ], "release_date": "2018-07-10T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: speculative bounds check bypass store" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" } ] }
rhsa-2019:1487
Vulnerability from csaf_redhat
Published
2019-06-17 19:56
Modified
2025-08-03 23:46
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)
* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)
* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)
* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)
* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* update the MRG 2.5.z 3.10 kernel-rt sources (BZ#1711010)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* update the MRG 2.5.z 3.10 kernel-rt sources (BZ#1711010)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:1487", "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/tcpsack", "url": "https://access.redhat.com/security/vulnerabilities/tcpsack" }, { "category": "external", "summary": "1535315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1711010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711010" }, { "category": "external", "summary": "1719123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123" }, { "category": "external", "summary": "1719128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128" }, { "category": "external", "summary": "1719129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1487.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-03T23:46:50+00:00", "generator": { "date": "2025-08-03T23:46:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:1487", "initial_release_date": "2019-06-17T19:56:43+00:00", "revision_history": [ { "date": "2019-06-17T19:56:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-06-17T19:56:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T23:46:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.50.3.rt56.644.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.50.3.rt56.644.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "product_id": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.50.3.rt56.644.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-06-17T19:56:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1487" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "cve": "CVE-2018-1000004", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1535315" } ], "notes": [ { "category": "description", "text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in sound system can lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "RHBZ#1535315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004" } ], "release_date": "2018-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-06-17T19:56:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1487" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in sound system can lead to denial of service" }, { "acknowledgments": [ { "names": [ "Jonathan Looney" ], "organization": "Netflix Information Security" } ], "cve": "CVE-2019-11477", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1719123" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "RHBZ#1719123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477" }, { "category": "external", "summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310", "url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5", "url": "https://www.openwall.com/lists/oss-security/2019/06/17/5" } ], "release_date": "2019-06-17T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-06-17T19:56:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "category": "workaround", "details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service" }, { "acknowledgments": [ { "names": [ "Jonathan Looney" ], "organization": "Netflix Information Security" } ], "cve": "CVE-2019-11478", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1719128" } ], "notes": [ { "category": "description", "text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "RHBZ#1719128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478" }, { "category": "external", "summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310", "url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5", "url": "https://www.openwall.com/lists/oss-security/2019/06/17/5" } ], "release_date": "2019-06-17T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-06-17T19:56:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "category": "workaround", "details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service" }, { "acknowledgments": [ { "names": [ "Jonathan Looney" ], "organization": "Netflix Information Security" } ], "cve": "CVE-2019-11479", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1719129" } ], "notes": [ { "category": "description", "text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "RHBZ#1719129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11479" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479" }, { "category": "external", "summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310", "url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5", "url": "https://www.openwall.com/lists/oss-security/2019/06/17/5" } ], "release_date": "2019-06-17T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-06-17T19:56:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "category": "workaround", "details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service" } ] }
rhsa-2018:2395
Vulnerability from csaf_redhat
Published
2018-08-14 20:23
Modified
2025-08-03 19:15
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.
Bug Fix(es):
* The kernel-rt packages have been upgraded to the 3.10.0-862.10.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1594915)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-862.10.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1594915)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2395", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1535173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1594915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594915" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2395.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-03T19:15:19+00:00", "generator": { "date": "2025-08-03T19:15:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2395", "initial_release_date": "2018-08-14T20:23:19+00:00", "revision_history": [ { "date": "2018-08-14T20:23:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T20:23:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T19:15:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-862.11.6.rt56.819.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "product": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "product_id": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.11.6.rt56.819.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13215", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1535173" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s skcipher component, which affects the skcipher_recvmsg function. Attackers using a specific input can lead to a privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: crypto: privilege escalation in skcipher_recvmsg function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, and kernel-alt packages.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, MRG-2 and real-time kernels.\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-13215" }, { "category": "external", "summary": "RHBZ#1535173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-13215", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13215" } ], "release_date": "2018-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: crypto: privilege escalation in skcipher_recvmsg function" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Carl Waldspurger" ], "organization": "Carl Waldspurger Consulting" }, { "names": [ "Vladimir Kiriansky" ], "organization": "MIT" } ], "cve": "CVE-2018-3693", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1581650" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: speculative bounds check bypass store", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3693" }, { "category": "external", "summary": "RHBZ#1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3693", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693" }, { "category": "external", "summary": "https://01.org/security/advisories/intel-oss-10002", "url": "https://01.org/security/advisories/intel-oss-10002" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3523601", "url": "https://access.redhat.com/solutions/3523601" }, { "category": "external", "summary": "https://people.csail.mit.edu/vlk/spectre11.pdf", "url": "https://people.csail.mit.edu/vlk/spectre11.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf", "url": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf" } ], "release_date": "2018-07-10T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: speculative bounds check bypass store" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" } ] }
rhsa-2019:1483
Vulnerability from csaf_redhat
Published
2019-06-17 19:14
Modified
2025-08-03 23:46
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)
* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)
* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)
* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)
* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Mistmach between 'tty->termios->c_lflag' and 'ldata->icanon' for 'ICANON' (BZ#1708061)
* RHEL7: rwsem reader/writer mutual exclusion guarantee may not work (BZ#1709702)
* hardened usercopy is causing crash (BZ#1712311)
* [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712991)
* [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712996)
* WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713002)
* [debug kernel] [x86_64]INFO: possible circular locking dependency detected (BZ#1715326)
* RHEL-7.7: tty: termios_rwsem possible deadlock (BZ#1715329)
Enhancement(s):
* [MCHP 7.7 FEAT] Update smartpqi driver to latest upstream (BZ#1709467)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Mistmach between \u0027tty-\u003etermios-\u003ec_lflag\u0027 and \u0027ldata-\u003eicanon\u0027 for \u0027ICANON\u0027 (BZ#1708061)\n\n* RHEL7: rwsem reader/writer mutual exclusion guarantee may not work (BZ#1709702)\n\n* hardened usercopy is causing crash (BZ#1712311)\n\n* [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712991)\n\n* [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712996)\n\n* WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713002)\n\n* [debug kernel] [x86_64]INFO: possible circular locking dependency detected (BZ#1715326)\n\n* RHEL-7.7: tty: termios_rwsem possible deadlock (BZ#1715329)\n\nEnhancement(s):\n\n* [MCHP 7.7 FEAT] Update smartpqi driver to latest upstream (BZ#1709467)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:1483", "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/tcpsack", "url": "https://access.redhat.com/security/vulnerabilities/tcpsack" }, { "category": "external", "summary": "1535315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1719123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123" }, { "category": "external", "summary": "1719128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128" }, { "category": "external", "summary": "1719129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1483.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-03T23:46:42+00:00", "generator": { "date": "2025-08-03T23:46:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:1483", "initial_release_date": "2019-06-17T19:14:57+00:00", "revision_history": [ { "date": "2019-06-17T19:14:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-06-17T19:14:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T23:46:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "kernel-0:3.10.0-693.50.3.el7.x86_64", "product_id": "kernel-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-693.50.3.el7.x86_64", "product_id": "python-perf-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "perf-0:3.10.0-693.50.3.el7.x86_64", "product_id": "perf-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.50.3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "kernel-0:3.10.0-693.50.3.el7.s390x", "product_id": "kernel-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x", "product_id": "kernel-headers-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "python-perf-0:3.10.0-693.50.3.el7.s390x", "product_id": "python-perf-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x", "product_id": "kernel-debug-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "perf-0:3.10.0-693.50.3.el7.s390x", "product_id": "perf-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x", "product_id": "kernel-devel-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.50.3.el7.src", "product": { "name": "kernel-0:3.10.0-693.50.3.el7.src", "product_id": "kernel-0:3.10.0-693.50.3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-693.50.3.el7.ppc64", "product_id": "python-perf-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "perf-0:3.10.0-693.50.3.el7.ppc64", "product_id": "perf-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.50.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.50.3.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "python-perf-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "perf-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "perf-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.50.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch", "product_id": "kernel-doc-0:3.10.0-693.50.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.50.3.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.50.3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.src", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.src", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.src", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-06-17T19:14:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1483" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "cve": "CVE-2018-1000004", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1535315" } ], "notes": [ { "category": "description", "text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in sound system can lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "RHBZ#1535315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004" } ], "release_date": "2018-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-06-17T19:14:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1483" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in sound system can lead to denial of service" }, { "acknowledgments": [ { "names": [ "Jonathan Looney" ], "organization": "Netflix Information Security" } ], "cve": "CVE-2019-11477", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1719123" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "RHBZ#1719123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477" }, { "category": "external", "summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310", "url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5", "url": "https://www.openwall.com/lists/oss-security/2019/06/17/5" } ], "release_date": "2019-06-17T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-06-17T19:14:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "category": "workaround", "details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service" }, { "acknowledgments": [ { "names": [ "Jonathan Looney" ], "organization": "Netflix Information Security" } ], "cve": "CVE-2019-11478", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1719128" } ], "notes": [ { "category": "description", "text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "RHBZ#1719128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478" }, { "category": "external", "summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310", "url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5", "url": "https://www.openwall.com/lists/oss-security/2019/06/17/5" } ], "release_date": "2019-06-17T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-06-17T19:14:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "category": "workaround", "details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service" }, { "acknowledgments": [ { "names": [ "Jonathan Looney" ], "organization": "Netflix Information Security" } ], "cve": "CVE-2019-11479", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1719129" } ], "notes": [ { "category": "description", "text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "RHBZ#1719129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11479" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479" }, { "category": "external", "summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310", "url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5", "url": "https://www.openwall.com/lists/oss-security/2019/06/17/5" } ], "release_date": "2019-06-17T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-06-17T19:14:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "category": "workaround", "details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service" } ] }
wid-sec-w-2025-1212
Vulnerability from csaf_certbund
Published
2019-04-16 22:00
Modified
2025-06-02 22:00
Summary
Oracle Communications Applications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Mit der Unified Communications Suite bietet Oracle eine Messaging- und Collaboration-Plattform an.
Oracle Communications Policy Management ist ein Produkt von Oracle und vereint mehrere Bereiche der Kommunikation.
Oracle Communications Unified Inventory Management (UIM) ist eine offene, standardbasierte Anwendung, die eine Bestandsaufnahme von Kommunikationsdiensten und -ressourcen ermöglicht.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um dadurch die Integrität, Vertraulichkeit und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Mit der Unified Communications Suite bietet Oracle eine Messaging- und Collaboration-Plattform an.\r\nOracle Communications Policy Management ist ein Produkt von Oracle und vereint mehrere Bereiche der Kommunikation.\r\nOracle Communications Unified Inventory Management (UIM) ist eine offene, standardbasierte Anwendung, die eine Bestandsaufnahme von Kommunikationsdiensten und -ressourcen erm\u00f6glicht.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um dadurch die Integrit\u00e4t, Vertraulichkeit und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1212 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2025-1212.json" }, { "category": "self", "summary": "WID-SEC-2025-1212 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1212" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2019 vom 2019-04-16", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixCGBU" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4218-1 vom 2019-12-11", "url": "https://usn.ubuntu.com/4218-1/" }, { "category": "external", "summary": "XEROX Security Advisory XRX25-012 vom 2025-06-02", "url": "https://security.business.xerox.com/wp-content/uploads/2025/06/Xerox-Security-Bulletin-XRX25-012-for-Xerox-FreeFlow-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Oracle Communications Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-06-02T22:00:00.000+00:00", "generator": { "date": "2025-06-03T09:23:36.426+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-1212", "initial_release_date": "2019-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2019-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2019-04-17T22:00:00.000+00:00", "number": "2", "summary": "Schreibfehler korrigiert" }, { "date": "2019-12-10T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "10", "product": { "name": "Oracle Communications EAGLE LNP Application Processor 10.0", "product_id": "T014014", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_eagle_lnp_application_processor:10.0" } } }, { "category": "product_version", "name": "10.1", "product": { "name": "Oracle Communications EAGLE LNP Application Processor 10.1", "product_id": "T014015", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_eagle_lnp_application_processor:10.1" } } }, { "category": "product_version", "name": "10.2", "product": { "name": "Oracle Communications EAGLE LNP Application Processor 10.2", "product_id": "T014016", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_eagle_lnp_application_processor:10.2" } } } ], "category": "product_name", "name": "Communications EAGLE LNP Application Processor" }, { "branches": [ { "category": "product_version", "name": "13.1", "product": { "name": "Oracle Communications LSMS 13.1", "product_id": "T006217", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_lsms:13.1" } } }, { "category": "product_version", "name": "13.2", "product": { "name": "Oracle Communications LSMS 13.2", "product_id": "T014017", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_lsms:13.2" } } }, { "category": "product_version", "name": "13.3", "product": { "name": "Oracle Communications LSMS 13.3", "product_id": "T014018", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_lsms:13.3" } } } ], "category": "product_name", "name": "Communications LSMS" }, { "branches": [ { "category": "product_version", "name": "8.1", "product": { "name": "Oracle Communications Messaging Server 8.1", "product_id": "T014019", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_messaging_server:8.1" } } }, { "category": "product_version", "name": "8", "product": { "name": "Oracle Communications Messaging Server 8.0", "product_id": "T014020", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_messaging_server:8.0" } } } ], "category": "product_name", "name": "Communications Messaging Server" }, { "branches": [ { "category": "product_version", "name": "12.2", "product": { "name": "Oracle Communications Policy Management 12.2", "product_id": "T009732", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_policy_management:12.2" } } }, { "category": "product_version", "name": "12.1", "product": { "name": "Oracle Communications Policy Management 12.1", "product_id": "T014021", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_policy_management:12.1" } } }, { "category": "product_version", "name": "12.3", "product": { "name": "Oracle Communications Policy Management 12.3", "product_id": "T014022", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_policy_management:12.3" } } }, { "category": "product_version", "name": "12.4", "product": { "name": "Oracle Communications Policy Management 12.4", "product_id": "T014023", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_policy_management:12.4" } } } ], "category": "product_name", "name": "Communications Policy Management" }, { "branches": [ { "category": "product_version", "name": "6", "product": { "name": "Oracle Communications Service Broker 6.0", "product_id": "329193", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_service_broker:6.0" } } } ], "category": "product_name", "name": "Communications Service Broker" }, { "branches": [ { "category": "product_version", "name": "8.2.0", "product": { "name": "Oracle Communications Session Border Controller 8.2.0", "product_id": "T014024", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_session_border_controller:8.2.0" } } }, { "category": "product_version", "name": "8.1.0", "product": { "name": "Oracle Communications Session Border Controller 8.1.0", "product_id": "T014025", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_session_border_controller:8.1.0" } } }, { "category": "product_version", "name": "8.0.0", "product": { "name": "Oracle Communications Session Border Controller 8.0.0", "product_id": "T014026", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_session_border_controller:8.0.0" } } } ], "category": "product_name", "name": "Communications Session Border Controller" }, { "branches": [ { "category": "product_version", "name": "3.1.0", "product": { "name": "Oracle Enterprise Communications Broker 3.1.0", "product_id": "T014030", "product_identification_helper": { "cpe": "cpe:/a:oracle:enterprise_communications_broker:3.1.0" } } }, { "category": "product_version", "name": "3.0.0", "product": { "name": "Oracle Enterprise Communications Broker 3.0.0", "product_id": "T014031", "product_identification_helper": { "cpe": "cpe:/a:oracle:enterprise_communications_broker:3.0.0" } } } ], "category": "product_name", "name": "Enterprise Communications Broker" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.4.0", "product": { "name": "Oracle Communications Unified Inventory Management 7.4.0", "product_id": "T013407", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_unified_inventory_management:7.4.0" } } }, { "category": "product_version", "name": "7.3.5", "product": { "name": "Oracle Communications Unified Inventory Management 7.3.5", "product_id": "T014027", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_unified_inventory_management:7.3.5" } } }, { "category": "product_version", "name": "7.3.2", "product": { "name": "Oracle Communications Unified Inventory Management 7.3.2", "product_id": "T014028", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_unified_inventory_management:7.3.2" } } }, { "category": "product_version", "name": "7.3.4", "product": { "name": "Oracle Communications Unified Inventory Management 7.3.4", "product_id": "T014029", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_unified_inventory_management:7.3.4" } } } ], "category": "product_name", "name": "communications_unified_inventory_management" } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9251", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2015-9251" }, { "cve": "CVE-2016-1000031", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2016-1000031" }, { "cve": "CVE-2016-1181", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2016-1181" }, { "cve": "CVE-2016-1182", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2016-1182" }, { "cve": "CVE-2016-7055", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2016-7055" }, { "cve": "CVE-2016-8735", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2016-8735" }, { "cve": "CVE-2017-0861", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-0861" }, { "cve": "CVE-2017-12617", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-12617" }, { "cve": "CVE-2017-15265", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-15265" }, { "cve": "CVE-2017-3730", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3730" }, { "cve": "CVE-2017-3731", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3731" }, { "cve": "CVE-2017-3732", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3732" }, { "cve": "CVE-2017-3733", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3733" }, { "cve": "CVE-2017-3735", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3735" }, { "cve": "CVE-2017-3736", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3736" }, { "cve": "CVE-2017-3738", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3738" }, { "cve": "CVE-2017-5645", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-5645" }, { "cve": "CVE-2017-5664", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-5664" }, { "cve": "CVE-2017-5753", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7525", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-7525" }, { "cve": "CVE-2018-0732", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-0732" }, { "cve": "CVE-2018-0733", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-0733" }, { "cve": "CVE-2018-0734", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-0734" }, { "cve": "CVE-2018-0737", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-0737" }, { "cve": "CVE-2018-0739", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-0739" }, { "cve": "CVE-2018-1000004", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1000180", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-1000180" }, { "cve": "CVE-2018-1000613", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-1000613" }, { "cve": "CVE-2018-10901", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-10901" }, { "cve": "CVE-2018-11039", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11039" }, { "cve": "CVE-2018-11040", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11040" }, { "cve": "CVE-2018-11218", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11218" }, { "cve": "CVE-2018-11219", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11219" }, { "cve": "CVE-2018-11236", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11236" }, { "cve": "CVE-2018-11237", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11237" }, { "cve": "CVE-2018-11784", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11784" }, { "cve": "CVE-2018-12384", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-12384" }, { "cve": "CVE-2018-12404", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-12404" }, { "cve": "CVE-2018-1257", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-1257" }, { "cve": "CVE-2018-1258", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-1258" }, { "cve": "CVE-2018-16864", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-16864" }, { "cve": "CVE-2018-16865", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-16865" }, { "cve": "CVE-2018-16890", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-16890" }, { "cve": "CVE-2018-3620", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-3646" }, { "cve": "CVE-2018-3693", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-3693" }, { "cve": "CVE-2018-6485", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-6485" }, { "cve": "CVE-2018-7489", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-7489" }, { "cve": "CVE-2018-7566", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-7566" }, { "cve": "CVE-2019-3822", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2019-3822" }, { "cve": "CVE-2019-3823", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2019-3823" } ] }
wid-sec-w-2022-0532
Vulnerability from csaf_certbund
Published
2018-05-01 22:00
Modified
2025-07-20 22:00
Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Debian ist eine Linux-Distribution, die ausschließlich Freie Software enthält.
Oracle Linux ist ein Open Source Betriebssystem, welches unter der GNU General Public License (GPL) verfügbar ist.
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, einen Denial of Service Angriff durchzuführen, Sicherheitsmechanismen zu umgehen, vertrauliche Daten einzusehen oder seine Privilegien zu erweitern.
Betroffene Betriebssysteme
- Appliance
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Debian ist eine Linux-Distribution, die ausschlie\u00dflich Freie Software enth\u00e4lt.\r\nOracle Linux ist ein Open Source Betriebssystem, welches unter der GNU General Public License (GPL) verf\u00fcgbar ist.\r\nDer Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, einen Denial of Service Angriff durchzuf\u00fchren, Sicherheitsmechanismen zu umgehen, vertrauliche Daten einzusehen oder seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- Appliance\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0532 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2022-0532.json" }, { "category": "self", "summary": "WID-SEC-2022-0532 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0532" }, { "category": "external", "summary": "Debian Security Advisory DSA-4187-1 vom 2018-05-01", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "category": "external", "summary": "Debian Security Advisory DSA-4188-1 vom 2018-05-01", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4088 vom 2018-05-01", "url": "https://linux.oracle.com/errata/ELSA-2018-4088.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4087 vom 2018-05-01", "url": "https://linux.oracle.com/errata/ELSA-2018-4087.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4089 vom 2018-05-02", "url": "http://linux.oracle.com/errata/ELSA-2018-4089.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1173-1 vom 2018-05-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1172-1 vom 2018-05-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181172-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1318 vom 2018-05-09", "url": "http://www.auscert.org.au/bulletins/62478" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1355 vom 2018-05-09", "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-1318 vom 2018-05-09", "url": "http://linux.oracle.com/errata/ELSA-2018-1318.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1217-1 vom 2018-05-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181217-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1238-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181238-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1225-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181225-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1240-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181240-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1230-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181230-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1223-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181223-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1228-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181228-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1236-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181236-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1239-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181239-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1231-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181231-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1229-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181229-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1237-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181237-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1232-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181232-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1227-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181227-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1234-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181234-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1233-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181233-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1226-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181226-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1235-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181235-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1222-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181222-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1224-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181224-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1263-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181263-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1221-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181221-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1220-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181220-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1249-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181249-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1246-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181246-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1252-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181252-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1260-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181260-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1270-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181270-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1262-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181262-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1242-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181242-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1268-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181268-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1248-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181248-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1258-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181258-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1272-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181272-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1250-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181250-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1253-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181253-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1241-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181241-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1259-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181259-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1256-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181256-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1245-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181245-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1264-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181264-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1254-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181254-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1266-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181266-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1269-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181269-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1251-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181251-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1255-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181255-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1273-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181273-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1243-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181243-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1244-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181244-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1261-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181261-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1267-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181267-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1247-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181247-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1257-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181257-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1374 vom 2018-05-16", "url": "https://access.redhat.com/errata/RHSA-2018:1374" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1309-1 vom 2018-05-17", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181309-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-1629 vom 2018-05-22", "url": "http://linux.oracle.com/errata/ELSA-2018-1629.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4114 vom 2018-05-23", "url": "http://linux.oracle.com/errata/ELSA-2018-4114.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1366-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181366-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1375-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181375-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1376-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181376-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1386-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181386-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1368-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181368-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1374-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181374-1.html" }, { "category": "external", "summary": "Oraclevm-errata OVMSA-2018-0223 vom 2018-05-23", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-May/000858.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1465-1 vom 2018-05-30", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181465-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1498-1 vom 2018-06-05", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181498-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1508-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181508-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1551-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181551-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1525-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181525-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1536-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181536-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1511-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181511-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1545-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181545-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1522-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181522-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1530-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181530-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1534-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181534-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1524-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181524-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1505-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181505-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1510-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181510-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1516-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181516-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1523-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181523-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1532-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181532-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1531-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181531-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1521-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181521-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1518-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181518-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1506-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181506-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1548-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181548-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1514-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181514-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1541-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181541-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1546-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181546-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1519-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181519-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1509-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181509-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1528-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181528-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1537-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181537-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1513-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181513-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1512-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181512-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1538-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181538-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1517-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181517-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1535-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181535-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1529-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181529-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1549-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181549-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1540-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181540-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1520-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181520-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1526-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181526-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1533-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181533-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1539-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181539-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1543-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181543-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1571-1 vom 2018-06-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181571-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1570-1 vom 2018-06-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181570-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1567-1 vom 2018-06-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181567-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1636-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181636-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1644-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181644-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1639-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181639-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1645-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181645-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1641-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181641-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1640-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181640-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1637-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181637-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1648-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181648-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1642-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181642-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1643-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181643-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4145 vom 2018-06-16", "url": "http://linux.oracle.com/errata/ELSA-2018-4145.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4134 vom 2018-06-16", "url": "http://linux.oracle.com/errata/ELSA-2018-4134.html" }, { "category": "external", "summary": "Red Hat Security Advisory", "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1762-1 vom 2018-06-20", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181762-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1761-1 vom 2018-06-20", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181761-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1772-1 vom 2018-06-21", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181772-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1816-1 vom 2018-06-26", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181816-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-1854 vom 2018-06-26", "url": "http://linux.oracle.com/errata/ELSA-2018-1854.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3698-1 vom 2018-07-03", "url": "http://www.ubuntu.com/usn/usn-3698-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3697-1 vom 2018-07-03", "url": "http://www.ubuntu.com/usn/usn-3697-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3696-1 vom 2018-07-03", "url": "http://www.ubuntu.com/usn/usn-3696-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4161 vom 2018-07-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4161.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4164 vom 2018-07-11", "url": "http://linux.oracle.com/errata/ELSA-2018-4164.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2162 vom 2018-07-11", "url": "http://linux.oracle.com/errata/ELSA-2018-2162.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2082-1 vom 2018-07-28", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182082-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2092-1 vom 2018-07-28", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2150-1 vom 2018-08-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182150-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2222-1 vom 2018-08-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182222-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4193 vom 2018-08-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4193.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2384 vom 2018-08-15", "url": "http://linux.oracle.com/errata/ELSA-2018-2384.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2390 vom 2018-08-15", "url": "http://linux.oracle.com/errata/ELSA-2018-2390.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2390 vom 2018-08-14", "url": "http://rhn.redhat.com/errata/RHSA-2018-2390.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2384 vom 2018-08-14", "url": "http://rhn.redhat.com/errata/RHSA-2018-2384.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2384 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2387 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2388 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2390 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2389 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2395 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2391 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2392 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2393 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2394 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2396 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2332-1 vom 2018-08-15", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182332-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2366-1 vom 2018-08-16", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182366-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4200 vom 2018-08-17", "url": "http://linux.oracle.com/errata/ELSA-2018-4200.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2637-1 vom 2018-09-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182637-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2631-1 vom 2018-09-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182631-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4211 vom 2018-09-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4211.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4308 vom 2018-10-01", "url": "https://www.debian.org/security/2018/dsa-4308" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3003-1 vom 2018-10-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3004-1 vom 2018-10-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183004-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3084-1 vom 2018-10-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183084-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4242 vom 2018-10-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4242.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4245 vom 2018-10-11", "url": "http://linux.oracle.com/errata/ELSA-2018-4245.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4250 vom 2018-10-13", "url": "http://linux.oracle.com/errata/ELSA-2018-4250.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2948 vom 2018-10-31", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:3096 vom 2018-10-31", "url": "https://access.redhat.com/errata/RHSA-2018:3096" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:3083 vom 2018-10-31", "url": "https://access.redhat.com/errata/RHSA-2018:3083" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3589-1 vom 2018-11-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183589-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3593-1 vom 2018-11-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183593-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-3083 vom 2018-11-06", "url": "http://linux.oracle.com/errata/ELSA-2018-3083.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3659-1 vom 2018-11-08", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183659-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4268 vom 2018-11-08", "url": "http://linux.oracle.com/errata/ELSA-2018-4268.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4269 vom 2018-11-08", "url": "http://linux.oracle.com/errata/ELSA-2018-4269.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4285 vom 2018-11-21", "url": "http://linux.oracle.com/errata/ELSA-2018-4285.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3934-1 vom 2018-11-29", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183934-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3961-1 vom 2018-12-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183961-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4301 vom 2018-12-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4301.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4304 vom 2018-12-12", "url": "http://linux.oracle.com/errata/ELSA-2018-4304.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:4069-1 vom 2018-12-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184069-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:4072-1 vom 2018-12-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184072-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4315 vom 2019-01-03", "url": "http://linux.oracle.com/errata/ELSA-2019-4315.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4316 vom 2019-01-04", "url": "http://linux.oracle.com/errata/ELSA-2019-4316.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4317 vom 2019-01-05", "url": "http://linux.oracle.com/errata/ELSA-2019-4317.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0095-1 vom 2019-01-16", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190095-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3880-2 vom 2019-02-05", "url": "https://usn.ubuntu.com/3880-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3910-1 vom 2019-03-16", "url": "https://usn.ubuntu.com/3910-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3910-1 vom 2019-03-16", "url": "https://usn.ubuntu.com/3910-2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:0641 vom 2019-03-26", "url": "https://access.redhat.com/errata/RHSA-2019:0641" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4596 vom 2019-04-01", "url": "http://linux.oracle.com/errata/ELSA-2019-4596.html" }, { "category": "external", "summary": "ORACLE OVMSA-2019-0014 vom 2019-05-03", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-May/000936.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1190 vom 2019-05-15", "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1170 vom 2019-05-15", "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1487 vom 2019-06-18", "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1483 vom 2019-06-18", "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2029 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2043 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2043" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4742 vom 2019-08-10", "url": "http://linux.oracle.com/errata/ELSA-2019-4742.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2029 vom 2019-08-14", "url": "http://linux.oracle.com/errata/ELSA-2019-2029.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:2430-1 vom 2019-09-23", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192430-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:2450-1 vom 2019-09-24", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4163-1 vom 2019-10-22", "url": "https://usn.ubuntu.com/4163-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4163-2 vom 2019-10-23", "url": "https://usn.ubuntu.com/4163-2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:4154 vom 2019-12-10", "url": "https://access.redhat.com/errata/RHSA-2019:4154" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:4159 vom 2019-12-10", "url": "https://access.redhat.com/errata/RHSA-2019:4159" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2018-252 vom 2020-01-07", "url": "https://downloads.avaya.com/css/P8/documents/101051981" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0036 vom 2020-01-07", "url": "https://access.redhat.com/errata/RHSA-2020:0036" }, { "category": "external", "summary": "Debian Security Advisory DLA 2148 vom 2020-04-01", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202003/msg00025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1587-1 vom 2020-06-10", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1603-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1599-1 vom 2020-06-10", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1602-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006932.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1604-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1602-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1599-1 vom 2020-06-10", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006924.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1605-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006930.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1605-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1671-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1656-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1663-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1646-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1754-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1758-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1775-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2156-1 vom 2020-08-07", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2323 vom 2020-08-12", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202008/msg00019.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4486-1 vom 2020-09-02", "url": "https://usn.ubuntu.com/4486-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2478-1 vom 2020-09-03", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2487-1 vom 2020-09-04", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2861-1 vom 2021-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2862-1 vom 2021-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08", "url": "http://linux.oracle.com/errata/ELSA-2021-9473.html" }, { "category": "external", "summary": "ORACLE OVMSA-2021-0035 vom 2021-10-12", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1988 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1975 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "external", "summary": "Debian Security Advisory DLA-3065 vom 2022-07-01", "url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9969 vom 2022-11-01", "url": "https://linux.oracle.com/errata/ELSA-2022-9969.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1848-1 vom 2023-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014466.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1897-1 vom 2023-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014485.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1992-1 vom 2023-04-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014572.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2232-1 vom 2023-05-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014918.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1183-1 vom 2025-04-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1195-1 vom 2025-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020680.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1194-1 vom 2025-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20480 vom 2025-07-18", "url": "https://linux.oracle.com/errata/ELSA-2025-20480.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-07-20T22:00:00.000+00:00", "generator": { "date": "2025-07-21T08:21:59.853+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2022-0532", "initial_release_date": "2018-05-01T22:00:00.000+00:00", "revision_history": [ { "date": "2018-05-01T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2018-05-01T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2018-05-02T22:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2018-05-08T22:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2018-05-10T22:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2018-05-13T22:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2018-05-15T22:00:00.000+00:00", "number": "7", "summary": "New remediations available" }, { "date": "2018-05-16T22:00:00.000+00:00", "number": "8", "summary": "New remediations available" }, { "date": "2018-05-21T22:00:00.000+00:00", "number": "9", "summary": "New remediations available" }, { "date": "2018-05-22T22:00:00.000+00:00", "number": "10", "summary": "New remediations available" }, { "date": "2018-05-23T22:00:00.000+00:00", "number": "11", "summary": "New remediations available" }, { "date": "2018-05-23T22:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2018-05-23T22:00:00.000+00:00", "number": "13", "summary": "Version nicht vorhanden" }, { "date": "2018-05-29T22:00:00.000+00:00", "number": "14", "summary": "New remediations available" }, { "date": "2018-06-05T22:00:00.000+00:00", "number": "15", "summary": "New remediations available" }, { "date": "2018-06-06T22:00:00.000+00:00", "number": "16", "summary": "New remediations available" }, { "date": "2018-06-07T22:00:00.000+00:00", "number": "17", "summary": "New remediations available" }, { "date": "2018-06-11T22:00:00.000+00:00", "number": "18", "summary": "New remediations available" }, { "date": "2018-06-17T22:00:00.000+00:00", "number": "19", "summary": "New remediations available" }, { "date": "2018-06-18T22:00:00.000+00:00", "number": "20", "summary": "New remediations available" }, { "date": "2018-06-19T22:00:00.000+00:00", "number": "21", "summary": "Added references" }, { "date": "2018-06-21T22:00:00.000+00:00", "number": "22", "summary": "New remediations available" }, { "date": "2018-06-24T22:00:00.000+00:00", "number": "23", "summary": "Added references" }, { "date": "2018-06-27T22:00:00.000+00:00", "number": "24", "summary": "Added references" }, { "date": "2018-07-10T22:00:00.000+00:00", "number": "25", "summary": "New remediations available" }, { "date": "2018-07-29T22:00:00.000+00:00", "number": "26", "summary": "New remediations available" }, { "date": "2018-08-01T22:00:00.000+00:00", "number": "27", "summary": "New remediations available" }, { "date": "2018-08-06T22:00:00.000+00:00", "number": "28", "summary": "New remediations available" }, { "date": "2018-08-09T22:00:00.000+00:00", "number": "29", "summary": "New remediations available" }, { "date": "2018-08-14T22:00:00.000+00:00", "number": "30", "summary": "New remediations available" }, { "date": "2018-08-14T22:00:00.000+00:00", "number": "31", "summary": "New remediations available" }, { "date": "2018-08-15T22:00:00.000+00:00", "number": "32", "summary": "New remediations available" }, { "date": "2018-08-16T22:00:00.000+00:00", "number": "33", "summary": "New remediations available" }, { "date": "2018-08-16T22:00:00.000+00:00", "number": "34", "summary": "Version nicht vorhanden" }, { "date": "2018-08-16T22:00:00.000+00:00", "number": "35", "summary": "Version nicht vorhanden" }, { "date": "2018-08-27T22:00:00.000+00:00", "number": "36", "summary": "Added references" }, { "date": "2018-09-06T22:00:00.000+00:00", "number": "37", "summary": "New remediations available" }, { "date": "2018-09-10T22:00:00.000+00:00", "number": "38", "summary": "New remediations available" }, { "date": "2018-10-01T22:00:00.000+00:00", "number": "39", "summary": "New remediations available" }, { "date": "2018-10-04T22:00:00.000+00:00", "number": "40", "summary": "New remediations available" }, { "date": "2018-10-09T22:00:00.000+00:00", "number": "41", "summary": "New remediations available" }, { "date": "2018-10-10T22:00:00.000+00:00", "number": "42", "summary": "New remediations available" }, { "date": "2018-10-14T22:00:00.000+00:00", "number": "43", "summary": "New remediations available" }, { "date": "2018-10-30T23:00:00.000+00:00", "number": "44", "summary": "New remediations available" }, { "date": "2018-10-31T23:00:00.000+00:00", "number": "45", "summary": "New remediations available" }, { "date": "2018-11-05T23:00:00.000+00:00", "number": "46", "summary": "New remediations available" }, { "date": "2018-11-07T23:00:00.000+00:00", "number": "47", "summary": "New remediations available" }, { "date": "2018-11-08T23:00:00.000+00:00", "number": "48", "summary": "New remediations available" }, { "date": "2018-11-20T23:00:00.000+00:00", "number": "49", "summary": "New remediations available" }, { "date": "2018-11-28T23:00:00.000+00:00", "number": "50", "summary": "New remediations available" }, { "date": "2018-12-02T23:00:00.000+00:00", "number": "51", "summary": "New remediations available" }, { "date": "2018-12-03T23:00:00.000+00:00", "number": "52", "summary": "Minor corrections" }, { "date": "2018-12-09T23:00:00.000+00:00", "number": "53", "summary": "New remediations available" }, { "date": "2018-12-11T23:00:00.000+00:00", "number": "54", "summary": "New remediations available" }, { "date": "2018-12-12T23:00:00.000+00:00", "number": "55", "summary": "New remediations available" }, { "date": "2019-01-03T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-01-06T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-01-15T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-02-04T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-03-17T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-03-25T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-03-31T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-05-05T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2019-05-15T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-06-17T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-08-06T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-08-11T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-08-13T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-09-23T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-09-24T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-10-21T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-10-22T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-12-09T23:00:00.000+00:00", "number": "73", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-12-09T23:00:00.000+00:00", "number": "74", "summary": "Version nicht vorhanden" }, { "date": "2020-01-06T23:00:00.000+00:00", "number": "75", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2020-01-07T23:00:00.000+00:00", "number": "76", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-04-01T22:00:00.000+00:00", "number": "77", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-06-09T22:00:00.000+00:00", "number": "78", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-11T22:00:00.000+00:00", "number": "79", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-18T22:00:00.000+00:00", "number": "80", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-25T22:00:00.000+00:00", "number": "81", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-08-06T22:00:00.000+00:00", "number": "82", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-08-12T22:00:00.000+00:00", "number": "83", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-09-01T22:00:00.000+00:00", "number": "84", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2020-09-03T22:00:00.000+00:00", "number": "85", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-09-06T22:00:00.000+00:00", "number": "86", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-08-29T22:00:00.000+00:00", "number": "87", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-10-10T22:00:00.000+00:00", "number": "88", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-10-11T22:00:00.000+00:00", "number": "89", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2022-05-10T22:00:00.000+00:00", "number": "90", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-03T22:00:00.000+00:00", "number": "91", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-11-01T23:00:00.000+00:00", "number": "92", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-04-16T22:00:00.000+00:00", "number": "93", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-18T22:00:00.000+00:00", "number": "94", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-24T22:00:00.000+00:00", "number": "95", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "96", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "97", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "98", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-10T22:00:00.000+00:00", "number": "99", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-14T22:00:00.000+00:00", "number": "100", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-20T22:00:00.000+00:00", "number": "101", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "101" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "6368", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7", "product": { "name": "Oracle Linux 7", "product_id": "287065", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:7" } } }, { "category": "product_version", "name": "6", "product": { "name": "Oracle Linux 6", "product_id": "T002988", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:6" } } }, { "category": "product_version", "name": "5", "product": { "name": "Oracle Linux 5", "product_id": "T003616", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:5" } } }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "product_name", "name": "Linux" }, { "category": "product_name", "name": "Oracle VM", "product": { "name": "Oracle VM", "product_id": "T011119", "product_identification_helper": { "cpe": "cpe:/a:oracle:vm:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9016", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2015-9016" }, { "cve": "CVE-2017-0861", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-0861" }, { "cve": "CVE-2017-13166", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-13166" }, { "cve": "CVE-2017-13220", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-13220" }, { "cve": "CVE-2017-16526", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-16526" }, { "cve": "CVE-2017-16911", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-16911" }, { "cve": "CVE-2017-16912", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-16912" }, { "cve": "CVE-2017-16913", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-16913" }, { "cve": "CVE-2017-16914", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-16914" }, { "cve": "CVE-2017-17975", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-17975" }, { "cve": "CVE-2017-18017", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18017" }, { "cve": "CVE-2017-18193", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18193" }, { "cve": "CVE-2017-18203", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18203" }, { "cve": "CVE-2017-18216", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18216" }, { "cve": "CVE-2017-18218", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18218" }, { "cve": "CVE-2017-18222", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18222" }, { "cve": "CVE-2017-18224", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18224" }, { "cve": "CVE-2017-18232", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18232" }, { "cve": "CVE-2017-18241", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18241" }, { "cve": "CVE-2017-18257", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18257" }, { "cve": "CVE-2017-5715", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-5753" }, { "cve": "CVE-2018-1000004", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1000199", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1000199" }, { "cve": "CVE-2018-10323", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1065", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1065" }, { "cve": "CVE-2018-1066", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1066" }, { "cve": "CVE-2018-1068", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1092", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1092" }, { "cve": "CVE-2018-1093", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1093" }, { "cve": "CVE-2018-1108", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1108" }, { "cve": "CVE-2018-5332", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-5333" }, { "cve": "CVE-2018-5750", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-5750" }, { "cve": "CVE-2018-5803", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-5803" }, { "cve": "CVE-2018-6927", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-6927" }, { "cve": "CVE-2018-7480", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-7480" }, { "cve": "CVE-2018-7492", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-7492" }, { "cve": "CVE-2018-7566", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-7566" }, { "cve": "CVE-2018-7740", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-7740" }, { "cve": "CVE-2018-7757", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-7757" }, { "cve": "CVE-2018-7995", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-7995" }, { "cve": "CVE-2018-8087", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8781", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8822", "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-8822" } ] }
fkie_cve-2018-7566
Vulnerability from fkie_nvd
Published
2018-03-30 21:29
Modified
2024-11-21 04:12
Severity ?
Summary
The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html | Third Party Advisory | |
cve@mitre.org | http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html | Patch, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/103605 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:2384 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:2390 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:2395 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:2948 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:1483 | ||
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:1487 | ||
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1550142 | Issue Tracking, Patch, Third Party Advisory | |
cve@mitre.org | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da | Patch, Vendor Advisory | |
cve@mitre.org | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3631-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3631-2/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3798-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3798-2/ | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2018/dsa-4187 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2018/dsa-4188 | Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpujul2020.html | ||
cve@mitre.org | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103605 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2384 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2390 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2395 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2948 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1483 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1487 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1550142 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3631-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3631-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3798-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3798-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4187 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4188 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | 4.15 | |
suse | linux_enterprise_module_for_public_cloud | 12 | |
suse | linux_enterprise_server | 12 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_eus | 7.5 | |
redhat | enterprise_linux_server_eus | 7.6 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_workstation | 6.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
oracle | communications_eagle_application_processor | 16.1.0 | |
oracle | communications_eagle_application_processor | 16.2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*", "matchCriteriaId": "380E55F5-238D-4FBB-8DB1-DB10EFC37CD0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*", "matchCriteriaId": "1B8F4626-6942-4A79-BF25-C8AD33A82034", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*", "matchCriteriaId": "B2F3699A-38E4-4E9D-9414-411F71D9E371", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_eagle_application_processor:16.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C0B6815-6F8F-422D-8A9C-2C22691787FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_eagle_application_processor:16.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B63EF130-191C-47A1-9D54-0AB3159EB303", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user." }, { "lang": "es", "value": "El kernel de Linux 4.15 tiene un desbordamiento de b\u00fafer mediante una operaci\u00f3n de escritura ioctl SNDRV_SEQ_IOCTL_SET_CLIENT_POOL en /dev/snd/seq por un usuario local." } ], "id": "CVE-2018-7566", "lastModified": "2024-11-21T04:12:22.790", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-30T21:29:02.010", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103605" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3631-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3631-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3798-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3798-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "source": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3631-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3631-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3798-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3798-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" }, { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2018-7566
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-7566", "description": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "id": "GSD-2018-7566", "references": [ "https://www.suse.com/security/cve/CVE-2018-7566.html", "https://www.debian.org/security/2018/dsa-4188", "https://www.debian.org/security/2018/dsa-4187", "https://access.redhat.com/errata/RHSA-2019:1487", "https://access.redhat.com/errata/RHSA-2019:1483", "https://access.redhat.com/errata/RHSA-2018:2948", "https://access.redhat.com/errata/RHSA-2018:2395", "https://access.redhat.com/errata/RHSA-2018:2390", "https://access.redhat.com/errata/RHSA-2018:2384", "https://ubuntu.com/security/CVE-2018-7566", "https://linux.oracle.com/cve/CVE-2018-7566.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-7566" ], "details": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "id": "GSD-2018-7566", "modified": "2023-12-13T01:22:32.824767Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7566", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3631-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3631-2/" }, { "name": "DSA-4187", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3631-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3631-1/" }, { "name": "RHSA-2018:2390", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2395", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "DSA-4188", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:2948", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "103605", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103605" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations", "refsource": "MLIST", "url": "http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html" }, { "name": "USN-3798-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3798-1/" }, { "name": "USN-3798-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3798-2/" }, { "name": "SUSE-SU-2018:0834", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" }, { "name": "RHSA-2019:1483", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "name": "RHSA-2019:1487", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da", "refsource": "CONFIRM", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:suse:linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:communications_eagle_application_processor:16.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_eagle_application_processor:16.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7566" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" }, { "lang": "en", "value": "CWE-362" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "name": "[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations", "refsource": "MLIST", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html" }, { "name": "SUSE-SU-2018:0834", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" }, { "name": "USN-3631-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3631-2/" }, { "name": "USN-3631-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3631-1/" }, { "name": "DSA-4188", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "DSA-4187", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "name": "RHSA-2018:2395", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2390", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2384", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3798-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3798-2/" }, { "name": "USN-3798-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3798-1/" }, { "name": "103605", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103605" }, { "name": "RHSA-2018:2948", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "RHSA-2019:1483", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "name": "RHSA-2019:1487", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "tags": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2020-08-24T17:37Z", "publishedDate": "2018-03-30T21:29Z" } } }
ghsa-qwh3-x82w-5462
Vulnerability from github
Published
2022-05-13 01:20
Modified
2022-05-13 01:20
Severity ?
VLAI Severity ?
Details
The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.
{ "affected": [], "aliases": [ "CVE-2018-7566" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-03-30T21:29:00Z", "severity": "HIGH" }, "details": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "id": "GHSA-qwh3-x82w-5462", "modified": "2022-05-13T01:20:36Z", "published": "2022-05-13T01:20:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3798-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3798-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3631-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3631-1" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html" }, { "type": "WEB", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "type": "WEB", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" }, { "type": "WEB", "url": "http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/103605" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…